This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
On April 8, 2021, we conducted a webinar with Ivan Kwiatkowski and Denis Legezo , Senior Security Researchers from our Global Research & Analysis Team (GReAT), who gave live workshops on practical disassembling, decrypting and deobfuscating authentic malware cases, moderated by GReAT’s own Dan Demeter.
Zero-trust - whatever that means to the presenter and audience; Cloud - meaning Azure, specifically; DevOps and DevSecOps - whatever those terms mean ; MS threat intelligence including artificial intelligence/machine learning rapid responses to novel malware (a cool idea, provided it works reliably).
As the global leader in Managed Security Services, Herjavec Group has demonstrated the innate ability to combine the power of technology, AI, and automation with human intelligence to optimize the IT security monitoring, incident detection, and incident response times of enterprises globally. HG Mana ged Detection & Response (MDR) .
This resource illuminates how some of today’s leading infosec women experts got started in the cybersecurity industry and embraced the common goal of creating a more secure world for everyone. Women in Technology (WIT): Cyber Security & Technology Special Interest Group (Cyber & Tech SIG). The Diana Initiative.
For strategic guidance and access to hands-on labs, register for one of our free Zero Trust Workshops. You’ll learn how to build a zero trust strategy and install and configure Duo, Umbrella, and other Cisco zero trust technologies. Or, download our white paper How to go from MFA to Zero Trust.
So yes, travel went up but I also did a bunch of remote workshops which helped keep that down, as well sending Scott Helme to run in-person ones that contributed to keeping me on Aussie soil. There are technologies that achieve both objectives. We need to help people understand that the technologies are there and use them effective.
This nonstop barrage of security crises has made certain infosec leaders and practitioners more aware than ever of the job’s impact on mental healthy, and the importance to protect against stress, exhaustion and burnout. But how have they been managing? But you don’t have to be a member of a formal group.
That's a heady mix of laws and regs that apply to the organisation, its officers and workers, its property and finances, its technologies, its contracts, agreements and relationships with employees and third parties including the authorities, owners, suppliers, partners, prospects and customers, and society at large. All requirements?!
Besides the keynote sessions and interactive panels, you’ll have access to hands-on workshops and some very useful techniques and methods. Making Your Code Fix Itself where he explains how Netflix’s OpenRewrite technology brings shift-left concepts to improve preexisting code. Jonathan Schneider, Moderne ? — ?Making Jonathan Schneider.
I’m not originally from the InfoSec world. Because Impro teaches spontaneity, Daniel Isler from Dreamlab Technologies, Fr1endlyRATs SE team, has called it the book that teaches how to be a social engineer (and you should read this one too). Their workshops will enlighten you to the value of acting skills in communication.
You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. There's a serious shortage of InfoSec professionals. I've mentioned before but InfoSec Twitter is a valuable resource. For many, though, that isn’t true.
You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. There's a serious shortage of InfoSec professionals. I've mentioned before but InfoSec Twitter is a valuable resource. For many, though, that isn’t true.
What role does technology play in facilitating intimate partner abuse? They discuss how software and IoT companies can avoid becoming the next Black Mirror episode and share resources that can help survivors (and those who want to help them) deal with the technology issues that can be associated with technologically facilitated abuse.
In information security (infosec) there is the need to be on the latest version. Writing exploits or developing infosec tools is no exception, they often need to have access to the latest libraries. We did not want to step on any other projects toes in infosec realm, or even IT in general. With technology, trends change.
PPP wanted to give their past high school selves the infosec education they didn’t have. Megan Kerns of Carnegie-Mellon University joins The Hacker Mind to talk about the early days and the continued evolution of this popular online infosec competition site. in InfoSec however, learning happens 365 days a year.
Altogether, this broad set of technology supports an incredible amount of our day-to-day livelihood and appears to have a grim threat profile. This talk was an open discussion between one of the hackers that founded DEF CON and the United States Deputy National Security Advisor for Cyber and Emerging Technology.
To start, challenges, and workshop tables. Within infosec, where so many challenges that are intangible -- like configuring network or firewalls. We have modern smartphones with some of the best photo technology to date. They were the first that anyone really remembers in those early single digit days of DEF CON.
To start, challenges, and workshop tables. Within infosec, where so many challenges that are intangible -- like configuring network or firewalls. We have modern smartphones with some of the best photo technology to date. They were the first that anyone really remembers in those early single digit days of DEF CON.
Vamosi: DEF CON turns 30 This year what began simply as a going away party for a coworker has since evolved over the decades into an annual summer tradition for InfoSec leaders in Las Vegas, which now includes other events such as besides Las Vegas, Diana is known as hackers summer camp. And … you won’t be disappointed.
And while safety is a big concern, I don't know if it's necessarily been in the cyberspace or the technology space yet and a lot of these systems will I do set them up and do decent controls is possible to potentially breach them and go after them. They werne’t talking to each other about emerging technological problems.
With technology advancements and improved feature sets, including products like Cisco’s Secure Endpoint Premier with SecureX Threat Hunting puts threat hunting well within the reach of all companies, no matter the size or security maturation level they have already achieved. Attend a Threat Hunting Workshop. Beers with Talos Ep. #97:
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content