Thank you for the excellent overview for all of the OWASP Top 10 2017! John made it really easy to understand each of the 10 attacks with his explanation!
Loved this series, as I have all the F5 Lightboard videos. Will you do a video on how to respond to a data breach, as this is an incredibly important thing to have in place.
glad you found it helpful! and, on the backwards writing...we flip the image in post-production, so i'm actually writing normally...but it provides a pretty cool effect! :)
Any open source log monitoring software (not just log parsing, storing, archiving) to automate this analysis/monitoring with custom rules? Do popular stacks like ELK or Graylog support this or should I roll my own?
You just explained these Top 10 OWASP better than those paid courses. Kudos to you guys. Keep it up!
glad you enjoyed the videos!
most comprehensive and easy explanation of OWASP Top 10.
even better than OWASP
Thanks alot
Thanks William...glad you enjoyed it!
He flipped the video
Dude gets 8.5 out of 10 for informative content and a bonus 1.5 marks for writing backwards on his screen :D
glad you enjoyed it!
did he really write backwards?? :O i don't think so.....but really awesome job on summarizing. I wish I found your videos earlier!
This is super late but I'm pretty sure that he's writing normal and then he flips the camera. Unless he's left handed and very impressive lol
Thank you for the excellent overview for all of the OWASP Top 10 2017! John made it really easy to understand each of the 10 attacks with his explanation!
glad you enjoyed them!
Thanks John Wagnon for the wonderful explanation of OWASP Top 10. I will give 10/10
Glad you enjoyed it!
thank you so much for the help..the content is to the point and addresses the security vulnerability to great extent.
Glad you enjoyed it!
Awww....what a lovely explanation....lots of love from India ❤️🤗
Appreciate the comment!
Thanks for the series, it was very well informative and easy to understand. Bonus points for the reversed t-shirt logo ;)
glad you enjoyed it!
Woohoo! Made it to the end. Great discussion!
awesome! glad you enjoyed the series!
Awesome explanation! Thank you so much.
glad you enjoyed it!
Wonderful OWASP top 10 videos. Very helpful for my certification!
glad you enjoyed them!
Great job, easy to understand the OWASP top ten, help me a lot.
glad you enjoyed it!
All 10 vulnerabilities were really clear, thank you!
glad you enjoyed the videos!
Thank you Dev central. Great info. Please keep it coming.b
glad you enjoy the videos!
Thank you, very clear and very easy to understand.
glad you enjoyed it!
Great series. Thanks!
glad you enjoyed it!
Awesome series
Thanks Ali...glad you enjoyed the series!
Thank you! I saw them all
Glad you enjoyed them!
Loved this series, as I have all the F5 Lightboard videos.
Will you do a video on how to respond to a data breach, as this is an incredibly important thing to have in place.
Great videos! Much easier to understand the top 10 than reading through the documentation. It's been bugging me, are you writing backwards?! :)
glad you found it helpful! and, on the backwards writing...we flip the image in post-production, so i'm actually writing normally...but it provides a pretty cool effect! :)
please give the link to the OWASP cheatsheet for logging.
Any open source log monitoring software (not just log parsing, storing, archiving) to automate this analysis/monitoring with custom rules? Do popular stacks like ELK or Graylog support this or should I roll my own?
Can I have your subtitles up?
nice playlist
show practilas if you can will be very very helpful
Thanks
where is the link?
Logging cheat sheet: cheatsheetseries.owasp.org/cheatsheets/Logging_Cheat_Sheet.html
Best solution is to automate logging and monitoring with SIEM such as Solarwinds and etc