Tag: conference
-
BSides Exeter 2024 Blue Track Lessons From The ISOON Leaks
Authors/Presenters: Will Thomas & Morgan Brazier Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/bsides-exeter-2024-blue-track-lessons-from-the-isoon-leaks/
-
BSides Exeter 2024 Blue Track DFIR Ctrl+Alt+Defeat: Using Threat Intelligence To Navigate The Cyber Battlefield
Authors/Presenters: Sophia McCall Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/bsides-exeter-2024-blue-track-dfir-ctrlaltdefeat-using-threat-intelligence-to-navigate-the-cyber-battlefield/
-
BSides Exeter 2024 Blue Track DFIR Tracking TTP Changes Of SocGhoulish
Tags: conferenceAuthor/Presenter: Chris Morgan Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/bsides-exeter-2024-blue-track-dfir-tracking-ttp-changes-of-socghoulish/
-
BSides Exeter 2024 Blue Track DFIR Digital Hostage: Navigating Ransomware Realities
Author/Presenter: Luke Weatherburn-Bird Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/bsides-exeter-2024-blue-track-dfir-digital-hostage-navigating-ransomware-realities/
-
Devnexus: Bringing Java Into The Age Of AI
The largest Java community conference, Devnexus 2025, tackled AI, security, and Java’s role in enterprise development. Read key takeaways for securing applications. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/devnexus-bringing-java-into-the-age-of-ai/
-
RSA Conference Playbook: Smart Strategies from Seasoned Attendees
Your guide on how to get through the conference with your sanity, energy, and key performance indicators (KPIs) intact. The post RSA Conference Playbook: Smart Strategies from Seasoned Attendees appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/rsa-conference-playbook-smart-strategies-from-seasoned-attendees/
-
BSides Exeter 2024 Blue Track DFIR Are We There Yet?
Tags: conferenceAuthor/Presenter: James Phillips Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/bsides-exeter-2024-blue-track-dfir-are-we-there-yet/
-
BSides Exeter 2024 Blue Track Suppliers: Trust, But Verify
Tags: conferenceAuthor/Presenter: Todd Gifford Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/bsides-exeter-2024-blue-track-suppliers-trust-but-verify/
-
ICYMI: Interesting Things We Learned at the HIMSS 2025 Conference
We had a good time talking to folks last week in our ColorTokens booth at the Healthcare Information and Management Systems Society conference in Las Vegas. The crowd was plentiful and engaged at the Venetian Convention Center and Ceasar’s Forum. Perhaps even more interesting than the keynote addresses and the latest-and-greatest information from the vendor……
-
At Ukraine’s major cyber conference, Europe takes center stage over US
The 2025 Kyiv International Cyber Resilience Forum looked and sounded different as European governments and cyber companies filled a void left by the Trump administration. First seen on therecord.media Jump to article: therecord.media/kyiv-cyber-conference-europe-center-stage-over-us
-
BSides Exeter 2024 Purple Track Turning The Tables: Using Cyber Deception To Hunt Phishers At Scale
Author/Presenter: Ross Bevington Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. via Friend of the Blog Trey Blalock at Verification Labs.com Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/bsides-exeter-2024-purple-track-turning-the-tables-using-cyber-deception-to-hunt-phishers-at-scale/
-
BSides Exeter 2024 Purple Track The Ransomware Negotiation Dilemma: The Pros And Cons Of Negotiation Strategies
Author/Presenter: Richard Foster Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/bsides-exeter-2024-purple-track-the-ransomware-negotiation-dilemma-the-pros-and-cons-of-negotiation-strategies/
-
BSides Exeter 2024 Purple Track Exercise Army Cyber Spartan
Author/Presenter: Ben Helliwell Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/bsides-exeter-2024-purple-track-exercise-army-cyber-spartan/
-
BSides Exeter 2024 Purple Track Cedar, An Open Source Project To Help You Decouple Your Authorisation Logic
Author/Presenter: Ricardo Sueiras Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/bsides-exeter-2024-purple-track-cedar-an-open-source-project-to-help-you-decouple-your-authorisation-logic/
-
BSides Exeter 2024 Purple Track Tales Of DOMinica
Tags: conferenceAuthor/Presenter:Liam Follin Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/bsides-exeter-2024-purple-track-tales-of-dominica/
-
Peter Kyle sets stage for making tech work
During his speech at the Tech Policy conference, Kyle announced a number of initiatives to support AI and other new technologies First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366620502/Peter-Kyle-sets-stage-for-making-tech-work
-
BSides Exeter 2024 Purple Track Panel: Mythbusting The Silver Bullet
Tags: conferenceAuthors/Presenters: Panel Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/bsides-exeter-2024-purple-track-panel-mythbusting-the-silver-bullet/
-
BSides Exeter 2024 Keynote: Matt Broomhall Richard DeVere
Tags: conferenceAuthors/Presenters: Matt Broomhall & Richard DeVere Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/bsides-exeter-2024-keynote-matt-broomhall-richard-devere/
-
BSides Exeter 2024 Keynote: Flushing Away Preconceptions Of Risk
Author/Presenter: Thom Langford Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/bsides-exeter-2024-keynote-flushing-away-preconceptions-of-risk/
-
BSides Exeter 2024 Keynote: Become A Better Security Engineer (By Not Doing Security)
Tags: conferenceAuthor/Presenter: Kane Narraway Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/bsides-exeter-2024-keynote-become-a-better-security-engineer-by-not-doing-security/
-
BSides Exeter 2024 Welcome From The Directors BSides Exeter Orga
Tags: conferenceBSides Exeter 2024 – Welcome From The Directors – BSides Exeter Orga Authors/Presenters: The BSides Exeter Directors Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/bsides-exeter-2024-welcome-from-the-directors-bsides-exeter-orga/
-
Critical DrayTek Router Vulnerabilities Expose Devices to RCE Attacks
Tags: attack, conference, cyber, firmware, office, rce, remote-code-execution, risk, router, vulnerabilityA recent security analysis of Draytek Vigor routers has uncovered severe vulnerabilities that could allow attackers to hijack devices, execute arbitrary code, and bypass critical security controls. These findings, disclosed by researchers at DEFCON 32 HHV and Ekoparty 2024, highlight systemic risks in widely used small office/home office (SOHO) routers due to outdated firmware, weak…
-
DEF CON 32 War Stories Hacking Millions Of Modems And Investigating Who Hacked My Modem
Author/Presenter: Sam Curry Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/def-con-32-war-stories-hacking-millions-of-modems-and-investigating-who-hacked-my-modem/
-
Fueling the Fight Against Identity Attacks
Tags: access, attack, business, cisco, cloud, conference, corporate, cyber, cybersecurity, exploit, identity, microsoft, open-source, penetration-testing, risk, service, software, technology, threat, tool, updateWhen we founded SpecterOps, one of our core principles was to build a company which brought unique insight into high-capability adversary tradecraft, constantly innovating in research and tooling. We aspired to set the cadence of the cyber security industry through a commitment to benefit our entire security community. Today, I am thrilled to announce that…
-
DEF CON 32 War Stories Breaking Network Crypto In Popular Chinese Keyboard Apps
Author/Presenter: Jeffrey Knockel, Mona Wang Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/def-con-32-war-stories-breaking-network-crypto-in-popular-chinese-keyboard-apps/
-
DEF CON 32 War Stories Xiaomi The Money: Our Toronto Pwn2Own Exploit BTS Story
Authors/Presenters: Ken Gannon, Ilyes Beghdadi Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/def-con-32-war-stories-xiaomi-the-money-our-toronto-pwn2own-exploit-bts-story/
-
DEF CON 32 War Stories Why Are You Still Using My Server For Your Internet Access
Author/Presenter: Thomas Boejstrup Johansen Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite []DEF CON 32]2 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/def-con-32-war-stories-why-are-you-still-using-my-server-for-your-internet-access/
-
DEF CON 32 Differential Privacy Beyond Algorithm: Challenges For Deployment
Author/Presenter: Rachel Cummings Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/def-con-32-differential-privacy-beyond-algorithm-challenges-for-deployment/
-
DEF CON 32 Cybersecurity Schoolhouse Rock
Author/Presenter: Avi McGrady Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/def-con-32-cybersecurity-schoolhouse-rock/

