This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
On April 8, 2021, we conducted a webinar with Ivan Kwiatkowski and Denis Legezo , Senior Security Researchers from our Global Research & Analysis Team (GReAT), who gave live workshops on practical disassembling, decrypting and deobfuscating authentic malware cases, moderated by GReAT’s own Dan Demeter.
Measuring Inclusion Workshops, conducted in collaboration with DEI Firm Aleria, are designed to pinpoint and remove the barriers in the cybersecurity industry that keep women from being recruited, hired, retained, and promoted at the same rate as men, according to a press release issued yesterday.
The post BSidesAugusta 2021 – Chris Truncer’s ‘Offensive WMI Workshop’ appeared first on Security Boulevard. Many thanks to BSidesAugusta for publishing their outstanding videos from the BSidesAugusta 2021 Conference on the organization’s YouTube channel.
The post DEF CON 29 Cloud Village – Magno Logan’s ‘Workshop Kubernetes Security 101 Best Practices’ appeared first on Security Boulevard. Our thanks to DEFCON for publishing their tremendous DEFCON Conference Cloud Village videos on the groups' YouTube channel.
I talk about that below including the preceding days involving some pretty full on sledding in Norway, workshops, talks, ice, slush and snow. Plus, of course, the actual infosec stuff from the week namely my new Pluralsight course on creating a security-centric culture. iTunes podcast | Google Play Music podcast | RSS podcast.
A quick nod also to Michael Argast and Chester Wisniewski (who, incidentally, wrote the earlier mentioned Sophos article) for their role in coining the phrase: I love the fact a term I coined with @chetwisniewski after running into a bunch of these a couple of years ago is getting tweeted by @troyhunt , one of my infosec heros.
The post Security BSides Athens 2021 – Workshop: Romansh Yadav”s ‘Attacking Defending Android Apps Training’ appeared first on Security Boulevard. Our thanks to Security BSides Athens for publishing their outstanding Security BSides Athens 2021 Conference videos on the groups' YouTube channel.
Herjavec Group supports the Assessment, Design, Deployment, and Management of your IAM solutions through a comprehensive offering including Strategic Workshops, Advisory Services, Architecture & Implementation, and Managed IAM. About CDM InfoSec Awards . Join a webinar at [link] and realize that infosec knowledge is power. .
The post Security BSides Athens 2021 – Workshop: Filipi Pires’ ‘Discovering C&C In Malicious Pdf With Obfuscation, Encoding And Other Tech’ appeared first on Security Boulevard.
Increasingly, I was writing about what I thought was a pretty fascinating segment of the infosec industry; password reuse across Gawker and Twitter resulting in a breach of the former sending Acai berry spam via the latter. To be completely honest, it's been an enormously stressful year dealing with it all.
The post Security BSides Athens 2021 – Workshop: Juan Escobar’s ‘ICS Intrusion KillChain Explained With Real Simulation’ appeared first on Security Boulevard. Our thanks to Security BSides Athens for publishing their outstanding Security BSides Athens 2021 Conference videos on the groups' YouTube channel.
The post Security BSides Athens 2021 – Workshop – Juan Escobar’ ‘ICS Intrusion KillChain Explained With Real Simulation’ appeared first on Security Boulevard. Our thanks to Security BSides Athens for publishing their outstanding Security BSides Athens 2021 Conference videos on the groups' YouTube channel.
For strategic guidance and access to hands-on labs, register for one of our free Zero Trust Workshops. Respect the user’s privacy and productivity by anonymizing location data and eliminating unnecessary decisions when continually verifying trust. For more information, check out our on-demand webinar Your Zero Trust Roadmap.
This resource illuminates how some of today’s leading infosec women experts got started in the cybersecurity industry and embraced the common goal of creating a more secure world for everyone. We then compiled their answers into an e-Book, Lifting Each Other Up: A Celebration of Women in Cybersecurity and Their Advocates. .
This nonstop barrage of security crises has made certain infosec leaders and practitioners more aware than ever of the job’s impact on mental healthy, and the importance to protect against stress, exhaustion and burnout. But how have they been managing? It’s okay to say, I’m overstressed, I need a break.’
It was also the week before Labor Day, which at the time meant it was teacher workshops, and I was on the road for it with 2 young kids at home. I showed up completely stressed out, not at all ready to do the work that was expected, and generally had a very difficult time.
Much of this is simply due to lack of awareness; I must have taught 50 security workshops where the vast majority of attendees had simply never heard of CSP before. Like CAA, CSP is one of those things that still has very limited adoption, despite the value they provide.
These were companies spanning all sorts of different industries; big tech, general infosec, antivirus, hosting, finance, e-commerce, cyber insurance - I could go on. The point is the net was cast very wide. I spoke at CERN. On the M&A front, I had to learn about normalised EBITDA, revenue multiples and ARR.
Besides the keynote sessions and interactive panels, you’ll have access to hands-on workshops and some very useful techniques and methods. Jasmine is an application security engineer, blogger, author, adjunct professor at Drexel, and 2020 Infosec Hall of Fame inductee. We assembled a lineup of experts who definitely “walk the walk”?
In July, the Federal Trade Commission hosted a workshop dubbed “ Nixing the Fix ” that delved into industry restrictions on repair. Introducing Securepairs.org: Fighting Infosec FUD for the Right to Repair.
I’m not originally from the InfoSec world. Their workshops will enlighten you to the value of acting skills in communication. Our readers often ask whether acting skills and classes would benefit their social engineering career. So, for this newsletter, I wanted to share how acting skills helped me become a vishing professional.
You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. There's a serious shortage of InfoSec professionals. I've mentioned before but InfoSec Twitter is a valuable resource. For many, though, that isn’t true.
You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. There's a serious shortage of InfoSec professionals. I've mentioned before but InfoSec Twitter is a valuable resource. For many, though, that isn’t true.
The talk was originally accepted for InfoSec World 2020 within the container security workshop, which of course then get rebooted and re-envisioned due to the pandemic. Through my job at the time, I came upon an idea for a talk, which I titled "7 Layers of Container Insecurity."
In information security (infosec) there is the need to be on the latest version. Writing exploits or developing infosec tools is no exception, they often need to have access to the latest libraries. We did not want to step on any other projects toes in infosec realm, or even IT in general. How did you pick the name?
PPP wanted to give their past high school selves the infosec education they didn’t have. Megan Kerns of Carnegie-Mellon University joins The Hacker Mind to talk about the early days and the continued evolution of this popular online infosec competition site. in InfoSec however, learning happens 365 days a year.
Sample To demonstrate the Sub-Operation category, we will investigate a sample that Jonathan Johnson wrote for our Malware Morphology workshop. The slides and labs are available in the linked GitHub repository, and a video recording of the workshop lecture is available on NorthSecs YouTubechannel.
It’s always interesting for me to hear how different people are approaching the same problems in infosec. They need input from vendors and users to build up a common database that in turn will be useful to the larger infosec community. Everyone’s got a unique perspective. There are the vendors, right?
Infosec is a constant cat and mouse game, it is important to keep on top of new research and newly discovered attack surface area in order to test and detect the security flaws before the threat actors do. Don’t be afraid of sending large (4gig +) payloads for clear/white/open box testing.
Fortunately, there are those in the InfoSec world, who are actively looking at the subject and speaking out at conferences, such as Black Hat. Vamosi: That talk focused on the fact that there are InfoSec hackers openly working to address this problem. Black Mirror brainstorms, a workshop in which you create Black Mirror episodes.
Vamosi: The Computer Science Annual Workshop or CSAW is a well-established CTF competition in New York. The general goal with Cyberstakes is to first and foremost to introduce and educate people with basic infosec skills. It’s sponsored by the NYU Center for Cybersecurity. Kearns: Your grandmother has a cell phone in her pocket.
This is bewildering, scary stuff, especially for relatively inexperienced infosec or cybersecurity professionals who seldom set foot outside of the IT domain. and that's a jolly good reason to arrange a management workshop or study to explore the entire mind map, talking it through and carving it up appropriately. All requirements?!
And so some of the things because of those work on nonprofit side, again, all all around the InfoSec community, but looking at these different villages, and if you remember to 2014 Around that time before that or so, car hacking was starting to be in the news, people were talking about it. That just made things difficult.
To start, challenges, and workshop tables. Within infosec, where so many challenges that are intangible -- like configuring network or firewalls. So these informal sessions were always part of the hacker culture, but it was really fella named Kai and his friend doc and some other people from Colorado in the 719 area code day.
To start, challenges, and workshop tables. Within infosec, where so many challenges that are intangible -- like configuring network or firewalls. So these informal sessions were always part of the hacker culture, but it was really fella named Kai and his friend doc and some other people from Colorado in the 719 area code day.
So yes, travel went up but I also did a bunch of remote workshops which helped keep that down, as well sending Scott Helme to run in-person ones that contributed to keeping me on Aussie soil. Flight wise, App in the Air captured things in a nice visual fashion: That's up 15,000km, 17 hours and 3 flights from last year.
Vamosi: DEF CON turns 30 This year what began simply as a going away party for a coworker has since evolved over the decades into an annual summer tradition for InfoSec leaders in Las Vegas, which now includes other events such as besides Las Vegas, Diana is known as hackers summer camp. Again, all all around the InfoSec community.
In fact, this report will change how we think about running infosec programs.”. Attend a Threat Hunting Workshop. Recommended reading (and listening): Access the full Cisco 2021 Security Outcomes Study. Beers with Talos Ep. #97: 97: Getting to better security outcomes (feat. Wendy Nather). The Value of Threat Hunting.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content