ggee

/ggee

About ggee

This author has not yet filled in any details.
So far ggee has created 181 blog entries.

Battle of the Booth Babes @ RSA

Which vendor will win the award of having the best booth babes?      Note that I didn't spend a lot of time on the expo floor, but I should have more time tomorrow to walk around. And due to the lack of time, I'm not sure how many of these people are hired "talent". Okay, [...]

2017-03-12T17:40:28-07:00 April 10th, 2008|Security Conferences|4 Comments

Battle of the Bags: Press vs Attendee

For this year's RSA conference, I am registered as a blogger, which allowed me to get a press credential. This is my first year attending as press, but I've covered many other security events like Black Hat, Defcon, and CanSecWest as press. So from past experience, the conference would give away the same SWAG to [...]

2017-03-12T17:40:28-07:00 April 9th, 2008|Security Conferences|2 Comments

Microsoft Hates Jews (@ RSA Party)

With my ever growing RSA party list, my friends made me decide which party we should  attend, so I selected Microsoft's party. I figured you can't go wrong with a huge company, and it was at the Cartoon Art Museum. The current theme for the main exhibit was Sex and Sensibility, and it contained many [...]

2017-03-12T17:40:28-07:00 April 9th, 2008|Parties|1 Comment

Vendor Parties @ RSA – Part 2

I didn't think my RSA vendor party list would get that much attention, but a few people reached out to me an told me about a few other parties. The additional vendors throwing a party are: IOActive, Ingrian, Sourcefire, Nokia, Chosen Security, Aladdin, MANDIANT, SecureIT Alliance, IBM, Deloitte, IdentityTruth, Akibia, Check Point, and Infoblox. I [...]

2017-03-12T17:40:28-07:00 April 8th, 2008|Parties|2 Comments

Infected Art Exhibit

MessageLabs threw a party tonight at the Varnish Gallery Bar, showcasing the computational art by Alex Dragulescu. There were six threat categories (viruses, spam, phishing, trojans, spyware, and malicious links) and all of the renderings were amazing. MessageLabs provided Alex with the disassembled code, and Alex ran it through his program that analyzed the code, [...]

2017-03-12T17:40:28-07:00 April 7th, 2008|Parties|0 Comments

SOURCE Boston 2008

Last month was the SOURCE Boston conference, and I heard it was a great event. Congrats to Stacy Thayer for running a successful conference. For those that weren't able to attend, they are starting to put the presentations and videos online. Also, AJolly and Cedric Blancher have their pictures online. I wish I could have [...]

2008-04-04T22:32:02-07:00 April 4th, 2008|Security Conferences|1 Comment

Vendor Parties @ RSA

Now that I have my RSA schedule in place, I have to figure out what I am doing in the evenings. So far I've been invited to seventeen (17!) vendor parties. In no particular order, the list of vendors are: Blue Coat, MessageLabs, SenSage, ESET, Ping Identity, Microsoft, Secure Computing, WASC, F-Secure, Voltage, Commtouch, Porter [...]

2008-04-02T20:55:06-07:00 April 2nd, 2008|Parties|0 Comments

April Events

April looks like a very busy month with 11 different events going on. Sharkfest '08: March 31 - April 2 Notacon 5: April 4 - 6 RSA Conference: April 7 - 11 UPSEC '08: April 14 LEET '08: April 15 SANS 2008: April 18 - 25 ToorCon Seattle 2008: April 18 - 20 Texas Regional [...]

2008-06-04T20:44:20-07:00 April 1st, 2008|Security Conferences, Security Workshops|0 Comments

CanSecWest: Summary

Another great event ran by Dragos and crew. I want to thank them for letting me cover the event on Twitter and the Infosec Events blog. My pictures are now up on flickr, and Ryo's flickr page has a ton of pictures as well. Now lets celebrate another successful event by opening a champagne bottle [...]

2017-03-12T17:40:28-07:00 March 31st, 2008|Security Conferences|0 Comments

CanSecWest: Day 2 Recap

Most Informative Talk: Intelguardians' cold memory forensics workshop. They leveraged the Princeton/Wind River/EFF research paper, and created two tools to extract passwords from a memory dump. The tools weren't released at the conference, but they promise that it will be available soon. Two people from the original research (Jacob Appelbaum and William Paul) was also [...]

2017-03-12T17:40:28-07:00 March 27th, 2008|Hacking Contests, Security Conferences|1 Comment