Tag: conference
-
The Guardian view on the Jaguar Land Rover cyber-attack: ministers must pay more attention to this growing risk | Editorial
Tags: attack, business, computer, conference, cyber, cybercrime, finance, government, risk, supply-chain, threatCybercriminals pose a seismic and increasingly sophisticated threat to businesses and national security. Yet Britain seems remarkably ill-preparedThe cause isn’t clear, but the impact has already been devastating. More than a month has passed since Jaguar Land Rover (JLR) was targeted in a cyber-attack that forced the car manufacturer to turn off computers and shut…
-
USENIX 2025: PEPR ’25 Career Advice For Privacy Engineers: From Resume To Interview To Finding The Next Job
Creator, Author And Presenters: Jason A. Novak, Google Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/usenix-2025-pepr-25-career-advice-for-privacy-engineers-from-resume-to-interview-to-finding-the-next-job/
-
USENIX 2025: PEPR ’25 Verifying Humanness: Personhood Credentials For The Digital Identity Crisis
Creator, Author and Presenter: Tanusree Sharma, Pennsylvania State University Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/usenix-2025-pepr-25-verifying-humanness-personhood-credentials-for-the-digital-identity-crisis/
-
Your Guide to EDUCAUSE 2025: What Higher-Ed Leaders Need to Know
What is EDUCAUSE 2025? The EDUCAUSE Annual Conference is where higher education’s technology and strategy communities come together. In 2025, it will be October 2730 in Nashville, with a follow-up online program on November 1213. The theme this year is “Restoring Trust”. It reflects the crossroads higher ed finds itself in: students and families expect……
-
USENIX 2025: PEPR ’25 Harnessing LLMs for Scalable Data Minimization
Creators, Authors and Presenters: Charles de Bourcy, OpenAI Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/usenix-2025-pepr-25-harnessing-llms-for-scalable-data-minimization/
-
USENIX 2025: PEPR ’25 Data Classification at Scale: Taming the Hydra
Creators, Authors and Presenters: Daniel Gagne, Meta Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/usenix-2025-pepr-25-data-classification-at-scale-taming-the-hydra/
-
USENIX 2025: Building An EndEnd De-Identification Pipeline For Advertising Activity Data At LinkedIn
Creators, Authors and Presenters: Saikrishna Badrinarayanan and Chris Harris, LinkedIn Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/usenix-2025-building-an-end-to-end-de-identification-pipeline-for-advertising-activity-data-at-linkedin/
-
USENIX 2025: PEPR ’25 Network Structure And Privacy: The Re-Identification Risk In Graph Data
Creator, Author and Presenter: Daniele Romanini, Resolve Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/usenix-2025-pepr-25-network-structure-and-privacy-the-re-identification-risk-in-graph-data/
-
USENIX 2025: PEPR ’25 Practical Considerations For Differential Privacy
Creator, Author and Presenter: Alex Kulesza Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/usenix-2025-pepr-25-practical-considerations-for-differential-privacy/
-
Ausblick: Check Point Software Technologies, Tenable Network Security und LANCOM Systems auf der it-sa 2025
Auf dem Controlware Security Day 2025 im hessischen Hanau hatten wir die Gelegenheit, mit drei anwesenden Controlware-Partnern kurze Videostatements aufzuzeichnen. Darin sprechen Thomas Boele von Check Point Software Technologies, Matthias Fraunhofer von Tenable Networks Security und Thomas Ehrlich von LANCOM Systems über das Security-Event it-sa ExpoCongress, das Anfang Oktober in Nürnberg stattfindet. Konkret wollten wir…
-
USENIX 2025: PEPR ’25 Establishing Privacy Metrics For Genomic Data Analysis
Creator, Author and Presenter: Curtis Mitchell, xD, United States Census Bureau Additional Authors: Gary Howarth And Justin Wagner, NIST; Jess Stahl, Census; Christine Task And Karan Bhagat, Knexus; Amy Hilla And Rebecca Steinberg, MITRE Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First…
-
USENIX 2025: PEPR ’25 My $5MM Differential Privacy Visualizations
Creator, Author and Presenter: Marc-Antoine Paré Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/usenix-2025-pepr-25-my-5mm-differential-privacy-visualizations/
-
Lancom Systems und Rohde Schwarz Cybersecurity zeigen Portfolio für umfassende Sicherheit von IT-Netzen
Auf der it-sa präsentieren sich Lancom Systems und Rohde & Schwarz Cybersecurity als starke Einheit und zeigen, wie ganzheitliche Netzwerksicherheit heute realisiert wird. Besucher können ein umfassendes Bild von sicherer Standortvernetzung über vertrauenswürdige Fernzugänge bis zu effektiver Bedrohungserkennung machen. Die Neuheiten im Lancom-Portfolio sind die WiFi-7-Access-Points LW-700 und LX-7200E mit integrierten Security-Features, die UF-560-Firewall, mit…
-
SMS Pools and what the US Secret Service Really Found Around New York
Tags: apple, authentication, business, china, conference, control, country, credit-card, crime, crypto, data, email, exploit, finance, fraud, google, group, Hardware, infrastructure, iphone, jobs, korea, law, linux, mfa, mobile, phishing, phone, scam, service, smishing, software, theft, usa, windowsLast week the United Nations General Assembly kicked off in New York City. On the first day, a strange US Secret Service press conference revealed that they had seized 300 SIM Servers with 100,000 SIM cards. Various media outlets jumped on the idea that this was some state-sponsored sleeper cell waiting to destroy telecommunication services…
-
USENIX 2025: PEPR ’25 Enterprise-Scale Privacy For AI: How Canva Scaled Customer Control Of Data For AI Training
Creator, Author and Presenter: Phillip Ward, Canva Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/usenix-2025-pepr-25-enterprise-scale-privacy-for-ai-how-canva-scaled-customer-control-of-data-for-ai-training/
-
USENIX 2025: PEPR ’25 UsersFirst: A User-Centric Threat Modeling Framework For Privacy Notice And Choice
Creators, Authors and Presenters: Norman Sadeh And Lorrie Cranor, Carnegie Mellon University Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/usenix-2025-pepr-25-usersfirst-a-user-centric-threat-modeling-framework-for-privacy-notice-and-choice/
-
News alert: Living Security unveils HRMCon 2025 lineup amid 81% human cyber risk visibility gap
Austin, Texas, Sept. 25, 2025, CyberNewswire, Living Security, a global leader in Human Risk Management (HRM), today announced the full speaker lineup for the Human Risk Management Conference (HRMCon 2025), taking place October 20, 2025, at Austin’s Q2… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/news-alert-living-security-unveils-hrmcon-2025-lineup-amid-81-human-cyber-risk-visibility-gap/
-
USENIX 2025: Using Privacy Infrastructure To Kickstart AI Governance: NIST AI Risk Management Case Studies
Creators, Authors and Presenters: Katharina Koerner, Trace3; Nandita Rao Narla, DoorDash Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/usenix-2025-using-privacy-infrastructure-to-kickstart-ai-governance-nist-ai-risk-management-case-studies/
-
USENIX 2025: PEPR ’25 Observable…Yet Still Private? An Offensive Privacy Perspective On Observability
Creators, Authors and Presenters: Cat Easdon, Dynatrace Research; Patrick Berchtold, Dynatrace Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/usenix-2025-pepr-25-observable-yet-still-private-an-offensive-privacy-perspective-on-observability/
-
USENIX 2025: PEPR ’25 Remediating Systemic Privacy Incidents
Creator, Author and Presenter: Sam Havron, Meta Our thanks to USENIX for publishing their Presenter’s outstanding USENIX ’25 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/usenix-2025-pepr-25-remediating-systemic-privacy-incidents/
-
USENIX 2025: PEPR ’25 Privacy Paradigms For Law Enforcement Response
Creators, Authors and Presenters: Lukas Bundonis, Netflix; Ben Ballard, MITRE Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/usenix-2025-pepr-25-privacy-paradigms-for-law-enforcement-response/
-
Living Security Unveils HRMCon 2025 Speakers as Report Finds Firms Detect Just 19% of Human Risk
Living Security, a global leader in Human Risk Management (HRM), today announced the full speaker lineup for the Human Risk Management Conference (HRMCon 2025), taking place October 20, 2025, at Austin’s Q2 Stadium and virtually worldwide. The announcement follows findings from the newly published 2025 State of Human Cyber Risk Report, produced by the Cyentia…
-
Building Essentials for a Robust OT Security Strategy
CS4CA Europe London Event Chair Wayne Harrop on OT Risk and Collaboration. Critical infrastructure providers are facing a volatile geopolitical landscape that could lead to cyberattacks and business disruptions. In advance of the CS4CA Europe London Conference (Sept. 30 – Oct. 1, 2025), conference chair Wayne Harrop shares key cyber strategies to counter enterprise threats.…
-
DEF CON 33: 40 Years Of Phrack: Hacking, Zines Digital Dissent
Creators, Authors and Presenters: Richinseattle, Netspooky, Chompie Our sincere appreciation to DEF CON, and the Creators/Presenters/Authors for publishing their timely DEF CON 33 outstanding content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/def-con-33-40-years-of-phrack-hacking-zines-digital-dissent/
-
Retro Tech Community Badge Life LIVE
Tags: conferenceCreators, Authors and Presenters: d3dbot, psyop, grrrizzzz Our sincere appreciation to DEF CON, and the Creators/Presenters/Authors for publishing their timely DEF CON 33 outstanding content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/retro-tech-community-badge-life-live/
-
Secret Service says it disrupted illicit cellular network threatening UN conference
The Secret Service said it discovered a secret communications network of more than 100,000 SIM cards and 300 servers capable of carrying out “nefarious” attacks in the New York City area as leaders convened for the U.N. General Assembly. First seen on therecord.media Jump to article: therecord.media/secret-service-cellular-network-disruption
-
DEF CON 33: Mar Williams
Tags: conferenceCreators, Authors and Presenters: Dreadwear, Mar Williams Our sincere appreciation to DEF CON, and the Creators/Presenters/Authors for publishing their timely DEF CON 33 outstanding content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/def-con-33-mar-williams/
-
CS4CA: OT Security Strategies for Critical Infrastructure
Speaker for Upcoming CS4CA Europe London Event Discusses OT Risk and Collaboration. IT and OT teams at critical infrastructure companies face the imperative of balancing digitalization and automation with cybersecurity. In advance of the CS4CA Europe London Conference (Sept. 30 – Oct. 1, 2025), event speaker Marta Majtenyi previews some of the major themes. First…
-
Flipper Blackhat: Wenn der Flipper Zero zum portablen LinuxTester wird
Wer möchte, kann sein Flipper Zero zu einer Art Schweizer Taschenmesser verwandeln. Damit sind unzählige Penetrationstests möglich. First seen on tarnkappe.info Jump to article: tarnkappe.info/artikel/it-sicherheit/flipper-blackhat-wenn-der-flipper-zero-zum-portablen-linux-pen-tester-wird-321012.html
-
Absicherung der hyperkonnektiven KI-gesteuerten Welt
Check Point Software Technologies stellt vom 7. bis 9. Oktober 2025 auf der it-sa aus. Zusammen mit den Partnern Bechtle und Netuse sowie mit Cyberint und Veriti unterstützt der Anbieter Organisationen bei der Absicherung der hyperkonnektiven KI-gesteuerten Welt. In Nürnberg stehen vor allem der Schutz von hybriden Mesh-Netzwerken und Workplaces im Mittelpunkt des Messeauftritts. Lars…

