conferences
The state of GRX security
Late last year, documents from Edward Snowden’s NSA trove have revealed that Britain’s GCHQ has mounted a successful attack against Belgacom (the largest telecom …
Defeating UEFI’s SecureBoot
The Unified Extensible Firmware Interface (UEFI) is ment to replace the Basic Input/Output System (BIOS) firmware interface found on all IBM PC-compatible personal computers. …
DARPA’s Cyber Grand Challenge offers $3.75 million in prizes
Computer security experts from academia, industry and the larger security community have organized themselves into more than 30 teams to compete in DARPA’s Cyber Grand …
Improving training programs in cyber security
In this podcast, recorded at Hack In The Box Amsterdam 2014, Lisha Sterling, Developer Coordinator at Geeks Without Bounds, talks about the problems in cybersecurity …
What inspired you to start hacking?
This is a question that Jennifer Steffens, IOActive CEO, often asks hackers she meets on conferences around the world. More often than not, the answer is movies: War Games, …
Walking through Hack In The Box 2014 Amsterdam
This year’s Hack In The Box conference is being held at the De Beurs van Berlage, which is an impressive venue located in central Amsterdam. The organization, the …
Hacking for the greater good
As long as people write code, they will write code with flaws, says Katie Moussouris, former Senior Security Strategist Lead at Microsoft Security Response Center and, as of …
(IN)SECURE Magazine Infosecurity Europe special issue released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. This year’s Infosecurity Europe conference and …
The importance of continuous monitoring
In this podcast, recorded at Infosecurity Europe 2014, Corey Bodzin, VP of Product Management at Qualys, discusses the need for continuous monitoring of the growing perimeter …
Making the web a safe place to visit
The new truth is that the web browser is, increasingly, the primary threat vector for cyber attacks on the enterprise. Confidential research available to Gartner members …
Infosecurity Europe 2014 showcase
Here’s a video overview of Infosecurity Europe 2014, that took place last week in London. For a roundup of news from the conference, including photo galleries, podcasts …
Hands on fun at HacKid 2014
Last weekend, families and tech industry leaders descended on The Tech Museum of innovation in San Jose, California, for HacKid 2014. We had a great turnout for the event …