<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1076912843267184&amp;ev=PageView&amp;noscript=1">

BSidesOK April 7, 2023 | Tulsa, Oklahoma

BSidesOK is a free information security conference focused on practical, hands-on training for improving security. Each BSides is a community-driven framework for building events for and by information security community members.

This is the premier security conference for the state of Oklahoma, pulling speakers from around the country, and attendees from several surrounding states.

Join ReversingLabs at the event!


Special Report

image1 (1)

The Evolution of Application Security

Learn about SCA tools, how app sec is evolving to tackle supply chain security — and download Forrester's Software Composition Analysis Landscape, Q1 2023.

See Special Report

Special Report

code illustration

Secrets Exposed: A Modern Guide for Securing Software Secrets

CircleCI and other breaches brought the issue of development secrets security to the fore. Learn about how and why secrets are exposed in development, best practices for securing secrets in your code, and more.

See Special Report

Threat Research

PyPi Blog cover

Developers beware: Imposter HTTP libraries lurk on PyPI

ReversingLabs researchers discovered dozens of malicious packages on Python Package Index that mimic popular libraries.

Read Report


The State of Software Supply Chain Security Social_1X

The State of Software Supply Chain Security 2022-23

Understand the major trends from 2022 — and what lies ahead in 2023. Download our full report, or learn more in our special report package.

See Special Report

Panel Discussion

Webinar: The State of Software Supply Chain Security 2022-23

Webinar: The State of Software Supply Chain Security 2022-23

Learn what’s needed to ensure the integrity of software delivery, the role of SBOMs in securing the supply chain, the latest federal requirements regarding securing the software supply chain, and the essential elements of an SBOM in this discussion.

Watch Discussion

Shift Your Focus


6 reasons to go beyond legacy vulnerabilities

With software supply chain attacks surging, dev and application security teams should shift gears from legacy vulnerabilities to open-source repos, DevOps tools, and software tampering. Learn why — and get our special report, NVD Analysis: A Call to Action on Supply Chain Security. 
See Report