.s02-poster.(16x9).jpg)
Hackers of CypherCon
2020•NR•53:00
Digital forensics expert Cindy Murphy, M.Sc., will use this session to unpack the myths of digital forensics she has unc...
2020•NR•47:00
In this very informative panel, Joe Cicero examines phishing bait for enterprise protection. Subjects covered are: the r...
2020•NR•51:00
The shift to the cloud is making it more difficult for security teams to control what happens in their organizations and...
2020•NR•47:00
Bug bounties and the Vulnerability Disclosure Program (VDP) are two of the fastest-growing ways for companies to engage ...
2020•NR•23:00
This talk provides an in-depth introduction to using the user-API to automate key functions in Hashtopolis. Topics inclu...
2020•NR•46:00
Amazing new A.I.-based services from Amazon, Google, and Microsoft let organizations rely on automated technology to cra...
2020•NR•20:00
Low-skilled opportunists (script kiddies) and APT (advanced persistent threats) (funded organised crime, nation states) ...
2020•NR•52:00
Wireless pentesting typically requires physical proximity to a target, which requires time, limited resources, and const...
2020•NR•38:00
The university security club had its ups and downs between boring meetings and inaccessibility to newcomers. It improved...
2020•NR•38:00
In this talk, you will learn various tools and techniques that can be used to thoroughly analyze a malicious email attac...
2020•NR•24:00
It only takes a small oversight to cause a vulnerability, even when it comes to severe vulnerabilities. The Buffalo Tera...