Remove Information Security Remove Technology Remove Workshop
article thumbnail

Data Enrichment, People Data Labs and Another 622M Email Addresses

Troy Hunt

i speak at conferences around the world and run workshops on how to build more secure software within organisations. i'm a pluralsight author, microsoft regional director and most valued professional (mvp) specialising in online security and cloud development. coordinates":[.

article thumbnail

Valuing CyberSecurity Research Datasets

Adam Shostack

A paper at the Workshop on the Economics of Information Security titled Valuing CyberSecurity Research Datasets focuses on the value of the IMPACT data sharing platform at DHS, and how the availability of data shapes research. There was a really interesting paper at the Workshop on the Economics of Information Security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISO workshop slides

Notice Bored

Zero-trust - whatever that means to the presenter and audience; Cloud - meaning Azure, specifically; DevOps and DevSecOps - whatever those terms mean ; MS threat intelligence including artificial intelligence/machine learning rapid responses to novel malware (a cool idea, provided it works reliably).

CISO 63
article thumbnail

Hacking IoT Security with Aaron Guzman

Security Boulevard

Sources and Sinks interviews car hacker and IoT security expert, Aaron Guzman. Information security is no longer staying on our laptops and in our browsers. As our devices become increasingly interconnected too, we have to start thinking about the security of our IoT devices. with a security twist.

IoT 106
article thumbnail

Valuing CyberSecurity Research Datasets

Adam Shostack

There was a really interesting paper at the Workshop on the Economics of Information Security. The paper is “ Valuing CyberSecurity Research Datasets.” ” The paper focuses on the value of the IMPACT data sharing platform at DHS, and how the availability of data shapes the research that’s done.

article thumbnail

Two flaws could allow bypassing AMD SEV protection system

Security Affairs

The chipmaker AMD published guidance for two new attacks against its SEV ( Secure Encrypted Virtualization ) protection technology. The findings about the two attacks will be presented by two research teams at this year’s 15th IEEE Workshop on Offensive Technologies (WOOT’21).

article thumbnail

Unlock Your Cybersecurity Potential: SecureWorld PLUS Training Courses

SecureWorld News

Real-world case studies Explore examples of how diverse organizationsincluding critical infrastructure, technology companies, and government agenciesleverage the CSF. Meet the instructors Larry Wilson , CISSP, CISA, was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc.,