Security Training

Week 34 In Review – 2014

Events Related

USENIX Security ’14 Technical Sessions – usenix.org
The full Proceedings published by USENIX for the symposium are available for download here. Individual papers can also be downloaded from the presentation page.

WOOT ’14 Workshop Program -usenix.org
The full papers published by USENIX for the workshop are available for download as an archive or individually below.

DEF CON 22 ICS […]

Week 33 In Review – 2014

Events Related

Def Con 22

DEFCON 22: The Con That Keeps on Giving – lunalindsey.com
Luna Lindsey is redefining the conference experience. She had an amazing time this year, as always. But as a neophile, she crave new experiences.
Def Con: the ‘Olympics of hacking’ – www.ft.com
Welcome to Def Con, the Olympics of hacking, where for 21 years computer hackers […]

Week 31 In Review – 2014

Resources

REcon 2014 Videos – recon.cx
REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. Here is the index of REcon 2014 videos. Watch and download the videos from here.
RVAsec 2014 Videos – rvasec.com
Miss a talk or even the entire conference? No problem! All of the speaker videos and presentations are […]

Information Security Events For August

Here are information security events in North America this month:
 

 Black Hat Las Vegas 2014 : Ausgust 2 to 7 in Las Vegas, NV, USA

 

DFRWS USA 2014 : August 3 to 6 in Denver, CO, USA

 

BSides Las Vegas 2014 : August 5 to 6 in Las Vegas, NV, USA

 

DEF CON 22 : August 7 to […]

Week 30 In Review – 2014

Resources

BSides Cleveland 2014 Videos – irongeek.com
These are the videos from the Bsides Cleveland conference. You can watch and download the videos from here.
Dispelling Confusion and Myths: iOS Proof-of-Concept – zdziarski.com
A quick POC demonstrating how File Relay and other services can be abused to dump a significant amount of personal data from an iOS device wirelessly, and […]

Week 29 In Review – 2014

Resources

BGA talk slides – twitter.com
Marshall twitted his BGA talk slides on twitter. You can download the pdf from here.
Building a Modern Security Engineering Organization – slideshare.net
Continuous deployment and the DevOps philosophy have forever changed the ways in which businesses operate. This talk with discuss how security adapts effectively to these changes.
Car Hacker’s Handbook – opengarages.org
Here you can […]

Week 28 In Review – 2014

Resources

Vendor Checklist app / Trust Metric app – archon.thewatchers.net
ISECOM (the Institute for Security and Open Methodologies) began with the release of the OSSTMM, the Open Source Security Testing Methodology Manual. It was a move to improve how security was tested and implemented.
Dumping Data from Memcached Servers – breenmachine.blogspot.com
Memcached servers provide a dynamic, distributed memory object caching […]

Week 27 In Review – 2014

Black Hat USA Briefings Giveaway
Enter to win an Black Hat USA 2014 Briefings ticket worth
$2,2000 from Infosec Events
Events Related

School on Applications of Open Spectrum and White Spaces Technologies – Schedule – wireless.ictp.it
ICTP School on Applications of Open Spectrum and White Spaces Technologies – 2014 workshop schedule is available here. You can download all of the […]

Information Security Events For July

Here are information security events in North America this month:
 

Symposium on Usable Privacy and Security 2014 : July 9 to 11 in Menlo Park, CA, USA

 

 

BSides Detroit 2014 : July 12 in Detroit, MI, USA

 

HOPE X : July 18 to 20 in New York, NY, USA

 

International Conference on Security and Management (SAM’14) : July […]

Week 26 In Review – 2014

Black Hat USA Briefings Giveaway
Enter to win an Black Hat USA 2014 Briefings ticket worth
$2,2000 from Infosec Events
Events Related

Hack in Paris 2014 Wrap-Up Day #1 – blog.rootshell.be
Hack in Paris, a French security conference held in Disneyland Resort Paris. The conference started with a sunny sky over the conference centre in the New York hotel. Here […]