We have a lot of suspicious attachments and files come into our networks. Let’s use these as a resource for training and preparation.
Watch more videos on my YouTube channel.
We have a lot of suspicious attachments and files come into our networks. Let’s use these as a resource for training and preparation.
Watch more videos on my YouTube channel.
Legacy and living dead systems have unique challenges for security teams. Take, for example, a 48 year old mainframe that’s still in production. Here is an architecture for prevention and detection.
Watch more videos on my YouTube channel.
Tracing the evolution of phishing techniques to highlight a simple rule: our defense don’t stop criminals, our defenses change criminals tactics.
Watch more videos on my YouTube channel.
When everything is automated, protecting the automation becomes critical. Now automation servers like Jenkins often use open source plugins. This is a problem when those plugins have underlying vulnerabilities, as researchers with NCC Group recently found. Own a plugin, own a pipeline, own a Cloud.
Watch more videos on my YouTube channel.
A lesson we can learn from the original Toronto Raptors, and what it says about the future of User Behavior Analytics.
Watch more videos on my YouTube channel.
Protecting, detecting, and responding to ElasticSearch data leaks. Our starting point is a job site leaking 1.6 million people’s job search information.
Watch more videos on my YouTube channel.
If you’ve recently crossed the US border, your photo is likely in the wind. But, hey. What happened was against policy.
Watch more videos on my YouTube channel.
With some twenty million consumer records in the wind, we look at requiring third-party billing companies to be secure.
Watch more videos on my YouTube channel.
Quick recap of the security on Apple’s new single sign-on offering.
Watch more videos on my YouTube channel.
CircleCityCon 2019 Keynote. Security happens where man meets machine. Or, fails to happen, as we see all too often. Blame the users. They’ll click anything. Blame the developers. Half their code is riddled with vulnerabilities anyways. Blame the IT staff. You’d think they’d at least know better. But perhaps, we’ve been placing the blame on the wrong places. What exactly happens where people and technology meet? At that moment, that very moment, what factors in human psychology and industrial design are at play? And suppose we could pause time for a moment. Suppose we could tease out those factors. Could we design a better experience, design a better outcome, design a better path to the future? This session explores these questions and identifies lessons the cyber security field can learn from industrial design. Because design theory? Design theory is cool.
Watch more videos on my YouTube channel.