# Title RETURN TO OVERVIEW PAGE
2020-07-11 Coding Expectations for Malware & Pentesting (29:47) CODE – SECURITY & TESTING
2020-06-23 Secure Coding Practices to Prevent Vulnerabilities (1:01:05)
2020-06-20 Secure Coding [Carnegie Mellon University Software Engineering Institute (41:15)
2020-06-15 Intel Tiger Lake processors will thwart future Spectre and Meltdown attacks
2020-05-27 Software Security and Secure Coding Practices : Session 6: Web Security (1:59:30)
2020-05-21 Introduction to Secure Coding and OWASP Top 10 (1:35:10)
2020-05-05 Cybersecurity Challenge PL2020
2020-04-06 Innocent Vulnerabilities vs Malicious Backdoors: How to Manage Your Risk (56:16)
2020-02-13 Finding Business Logic Flaws, Data Leakage and Hard Coded Secrets in Development (54:40)
2019-11-28 Developing Cyber Resilient Systems: A Systems Security Engineering Approach
2019-11-03 Secure-Coding Workshop (1:45:12)
2019-10-16 Enabling Secure Code at Scale with Spring & OAuth2 (31:00)
2019-09-05 Secure-coding practices (58:49)
2019-07-25 Secure Coding in C/C++ (28:12)
2019-06-09 OWASP DevSlop Show: Security Code Review 101 (1:01:04)
2019-05-15 Coding Secure Code: Best Practices, Advice for Writing Secure Code (45:20)
2019-04-12 GPS Flaw: Security Expert Says He Won't Fly April 6
2019-03-05 Huge Risks From SaaS Orgs With No Test Regions or Change Controls (53:24)
2019-02-28 Secure Coding – Best Practices (57:44)
2019-02-19 No Change Control is Like Playing with Fire in a Dynamite Factory (56:10)
2019-02-08 Parenting site Mumsnet hit by data breach
2019-01-09 Secure Coding with JavaScript (1:21:48)
2019 RSA  2019 Survey: security not in application life cycle from start
2019 Veracode AppSec Knowledge Base (extensive resources)
2018 C++Now 2018: Matthew Butler “Secure-Coding Best Practices” (1:27:24)
2018 Learn DevOps and its Foundational Technologies (Veracode)
2018 Secure Coding
2018 Secure Programming Practices in C++ - NDC Security 2018 (51:34)
2018 Secure-Coding Best Practices (59:55)
2018 Secure-Coding Best Practices [for C++] (1:27:24)
2018 Secure-Coding Cheat Sheet
2018 Secure-Coding practices in Java: challenges and vulnerabilities
2018 Securing Code (SANS Reading Room resources)
2018 SEI CERT Coding Standards
2018 The Art of Secure Code
2018 The Top 12 Practices of Secure Coding
2018 Wells Fargo computer glitch blamed as hundreds lose their homes
2018 Writing Secure JavaScript (24:14)
2017 Debug Like a Champion
2017 Hungry penguins help keep car code safe
2017 New Security Control Enhancements Java 8 and 9 - Jim Manico (1:23:45)
2017 Scaling a Software Security Initiative (AppSec CA 2017 - Gary McGraw (50:42)
2017 Secure by Design: the Architect's Guide to Security Design Principles (43:56)
2017 Secure Coding - CERT
2017 Secure Coding - INFOSEC Institute
2017 Secure-Coding Guidelines - Microsoft
2017 Secure-Coding Practice Guidelines - UC Berkeley INFOSEC & Policy
2017 Secure-Coding Practices Quick Reference Guide - OWASP
2017 Security Best Practices for Serverless Applications - Justin Pirtle (40:41)
2017 Security Development Lifecycle and Static Code Analysis (31:53)
2017 SEI CERT Coding Standards
2017 Spring Security in a Spring Boot App with Example - Tech Primers (31:28)
2017 The OWASP Top Ten Proactive Controls - Jim Manico (1:24:29)
2017 Top 10 Secure-Coding Practices - CERT
2016 Addressing Security Vulnerabilities at the Source - PRQA [signup req'd]
2016 Advances in Secure-Coding Frameworks (AppSec CA 2016) - Jim Manico (46:37)
2016 Amazon gadget hijacks owner's heating after hearing radio report
2016 Dilbert & e-voting
2016 DON'T SET YOUR IPHONE BACK TO 1970, NO MATTER WHAT
2016 Five Principles for Securing DevOps - Veracode [signup req'd]
2016 Hacking Lottery Machines - Schneier on Security
2016 Microsoft 'deeply sorry' for offensive tweets by AI chatbot
2016 New website lets anyone spy on Tinder
2016 Nissan disables Leaf app after hack risk revealed online - BBC News
2016 Overview: Trustwave Managed Security Testing (2:02)
2016 Secure-Coding Patterns - Andreas Hallberg (50:25)
2016 UC Berkeley profs lambast new “black box” network monitoring hardware
2015 9 Secure-Coding Practices You Can’t Ignore - Checkmarx
2015 Automated Software Testing for the 21st Centure (32:26)
2015 Security is the loser in the holy war between Android and Apple
2015 Test Automation Implementation Strategy (54:49)
2015 Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware (47:30)
2015 Volkswagen Scandal Confirms the Dangers of Proprietary Code | David Bollier
2014 Test Automation Frameworks using Open Source Tools (53:18)
2012 Automated Security Testing (34:38)
2012 Beyond Scanning: Automated Web Application Security Testing (47:37)
2012 Test Automation -- 10 (sometimes painful) Lesson Learned (45:41)