conferences
Cuckoo Sandbox: Automated malware analysis
Cuckoo Sandbox is an open source automated malware analysis system. It started as a Google Summer of Code 2010 project with The Honeynet Project and evolved into being one of …
Getting ahead of the security poverty line
Being stuck below the security poverty line isn’t about budget, it’s about attitude, motivation, and focusing not simply on basic compliance but rather on your …
Video: Attacking XML preprocessing
Documenting more than a year of research in XML technologies, this talk by Nicolas Grégoire at Hack in The Box 2012 Amsterdam details security implications of the XML format …
Investigating Android permissions
Georgia Weidman is the founder of Bulb Security. She’s also a penetration tester, security researcher, and trainer. In this video recorded at Hack in The Box 2012 …
Computer forensics training in Prague
In this interview, Gareth Dance, Conference Director, EMEA, SANS Institute, talks about SANS Forensics Prague 2012. SANS Forensics Prague 2012 is a technically intense event. …
Hack In The Box conferences
In this video, Dhillon Andrew Kannabhiran, Founder and CEO of Hack in The Box, talks about the Hack in The Box Security Conference (HITBSecConf) series. What started as a …
Photos: HITBSecConf 2012 Amsterdam
Taking place this week in Amsterdam is the well-known HITBSecConf that features deeply technical talks, workshops, hands-on lab sessions, a brand new attack and defense …
SANS announces digital forensics training event in Europe
SANS is launching its first dedicated digital forensics training event in Prague in October offering a full immersion experience over a 7 day event combining leading …
Cloud Security Alliance announces EMEA congress
Building on the success of the Cloud Security Alliance Congresses held in the USA, the inaugural CSA EMEA Congress (Amsterdam, 25-26 September 2012) will provide practical …
Top three security concerns for CSOs and CIOs
The breakneck speed of technology evolution, the ever changing threat landscape, and the increasing flexibility, ingenuity and persistence of cyber attackers have made …
Three BYOD problems that need to be solved
The Bring Your Own Device (BYOD) phenomenon has long stopped being just a fad and the option has become a crucial part of keeping employees and contractors happy and …
Information auditing training at SANS Secure Europe 2012
SANS Secure Europe 2012, one of the region’s largest infosec training events will be offering a new course this year to help business and technical staff learn the …
Featured news
Resources
Don't miss
- LiteLLM PyPI packages compromised in expanding TeamPCP supply chain attacks
- Training an AI agent to attack LLM applications like a real adversary
- You don’t have to choose between BAS or automated pentesting, you shouldn’t
- Why your phishing simulations aren’t building a security culture
- Your security stack looks fine from the dashboard and that’s the problem