Events Add an event Speakers Talks Collections
 

Talks

Sort by
Newest
Trending
1-30 of 48
1-30 of 48
Filter

100Bn USD in Crypto "Lost", Can it be Recovered?

10/08/2021
Views 769
0
biometrics, bitcoin, crypto, database, encryption, ethereum, github, keynote, live, london, patent, price, reddit, software , brute-force attack, client (computing), cryptographic hash function, dogecoin, fingerprint, initial coin offering, jesus, online and offline, passphrase, password, public-key cryptography, server (computing), wallet, world wide web, pound sign, 2021, token2049, 100bn usd in crypto lost can it be recovered? - robert rhodin (keychainx) - token2049 london, keychainx, robert rhodin
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

How to truly align your product and sales teams: 5 things we learned at Divvy

09/30/2021
Views 190
0
bias, chief executive officer, communication, conversation, design, leadership, learning, linkedin, marketplace, nothing, organization, product design, product management, risk, ux, brute-force attack, credibility, credit card, dead end (street), go to market, metaphor, moon, mutual exclusivity, prototype, rubric (academic), scrum (software development), strategic management, divvy
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

s-130: Test of Time Award Ceremony + Cryptanalysis 1

08/18/2021
Views 441
0
cryptography , encryption, microcontroller, wave, 64-bit computing, algebra, block cipher, block cipher mode of operation, brute-force attack, cryptographic hash function, equation, field (mathematics), function (mathematics), hash function, matrix (mathematics), nonlinear system, parameter, polynomial, prime number, quadratic function, ring (mathematics), variable (mathematics), field extension, finite field, sponge function
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Critical Infrastructure Network Attacks: Code Red, Alert Network Operators

01/27/2021
Views 490
0
backup, computer security, cybersecurity, database, information, infosec, infrastructure, ransomware, rsa, rsac, rsaconference, security, active directory, advanced persistent threat, brute-force attack, computer network, cyberattack, cybercrime, cyberwarfare, dmz (computing), firewall (computing), honeypot (computing), industrial control system, leverage (finance), password, remote desktop protocol, scada, user (computing), wireless access point, domain controller (windows), electrical substation, extortion
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Serverless security modeling in Firebase

10/29/2020
Views 4.14 K
0
api, authentication, cloud computing, database, email, firebase, mobile app, proprietary software, ransomware, security token, sms, unit testing, access control, brute-force attack, denial-of-service attack, json web token, multi-factor authentication, password, representational state transfer, scope (computer science), server (computing), software development kit, vulnerability (computing), firebase cloud messaging, anonymous (hacker group), serverless security modeling
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

What’s Old is New: Hybrid Security for Microsoft Azure and On-Premises Tech

05/20/2021
Views 326
0
email, icloud, identity management, ios, ransomware, security token, sharepoint, twitter, active directory, android (operating system), brute-force attack, computer file, computer network, firewall (computing), group policy, kerberos (protocol), mobile device management, multi-factor authentication, password, server message block, superuser, user (computing), web portal, domain controller (windows), federated identity, hybrid security
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Analyzing Windows Malware on Linux: Getting Started Tips and Examples

05/17/2021
Views 6.85 K
0
api, cryptography , database, debugging, encryption, linux, malware, vmware, antivirus software, brute-force attack, command-line interface, computer file, cryptographic hash function, digital signature, disassembler, domain name system, file format, hard coding, intelligence analysis, intrusion detection system, microsoft windows, string (computer science), user agent, world wide web, malware on linux, virtual appliance
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

System Software for Machine Learning at the Edge

08/19/2020
Views 343
0
artificial intelligence, central processing unit, computer, computer hardware, computer science, computer vision, deep learning, frame rate, graphics processing unit, human, information, information technology, internet, machine learning, machine learning tutorials, video, attention, brute-force attack, data compression, imax, imagenet, integrated circuit, low-power electronics, meltdown (security vulnerability), parking lot, polygraph, sensor, energy level, machine learning 2020, tinyml foundatio
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Solving Spectroscopic Problems with Pythonic Workflows and Deep Learning | SciPy 2020 | Kelvin Lee

07/06/2020
Views 1.95 K
0
astronomy , database, deep learning, mathematics, metadata, pattern recognition, probability, python, astrophysics, brute-force attack, determinism, electromagnetic spectrum, interferometry, optics, parameter, probability distribution, sampling (statistics), statistical inference, telescope, observational astronomy, radio telescope, astronomy and astrophysics, automated workflows, radio telescopes, reproductability, rotational spectroscopy, astrochemistry, astronomical interferometer, event horizon telescope, harvard–smithsonian center for astrophysics, interstellar medium
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

How Prime Numbers Keep the Internet Secure - Sun-Li Beatteay

11/18/2020
Views 300
0
concept, cryptography , encryption, internet security, privacy, question, brute-force attack, data at rest, factorization, handshaking, hypertext transfer protocol, key (cryptography), modular arithmetic, number, password, public-key cryptography, server (computing), symmetric-key algorithm, transport layer security, trapdoor function, ssh (secure shell), one-way function, integer factorization, euler's totient function
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Protect Your PostgreSQL Passwords: How SCRAM Works & Why You Need It - Jonathan S. Katz : PGCon 2020

05/27/2020
Views 691
0
2017, authentication, cryptography , postgresql, snapchat, active directory, brute-force attack, client–server model, cryptographic hash function, handshaking, kerberos (protocol), lightweight directory access protocol, login, man-in-the-middle attack, multi-factor authentication, password, public key certificate, sha-2, server (computing), string (computer science), transport layer security, md5, hmac, key derivation function, salted challenge response authentication mechanism, pgcon, pgcon2020, pgcon 2020, salt (cryptography)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Plundervolt: Flipping Bits from Software without Rowhammer

08/06/2020
Views 677
0
cryptography , encryption, intel, operating system, arm architecture, advanced encryption standard, brute-force attack, clock rate, ddr4 sdram, laptop, modular arithmetic, openssl, password, pointer (computer programming), prime number, public-key cryptography, rsa (cryptosystem), random-access memory, software guard extensions, world wide web, ddr3 sdram, ecc memory, row hammer, dynamic frequency scaling, gaming computer
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Securing and Truly Owning Your Digital Wealth

02/28/2021
Views 61
0
backup, bitcoin, blockchain, central processing unit, computer, computer hardware, facebook, future, google, hacker, money, privacy, quantum computing, risk, bit, brute-force attack, camera, face id, personal identification number, public-key cryptography, qr code, random number generation, sensor, universe
Available
In cart
1 592 ₽
1 592 ₽
$20
$20
€ 20
€ 20
A$31
A$31
£17
£17
C$29
C$29

Securing the New Normal:  How Cyber AI Learns on the Job

08/18/2020
Views 46
0
ai, artificial, artificial intelligence, communication, computer security, cyber, cyber security, cybersecurity, darktrace, data science, database, deep learning, disability, email, human, intelligence, learning, machine, machine learning, ml, phishing, ransomware, salesforce, security, statistics, strategy, technology, threat intelligence, brute-force attack, monero (cryptocurrency), psychological resilience, telecommunication, understanding, virtual private network, ai4, ai4 2020, computer intelligence, cyber ai, marcus fowler
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Securing the New Normal:  How Cyber AI Learns on the Job

08/18/2020
Views 46
0
ai, artificial, artificial intelligence, communication, computer security, cyber, cyber security, cybersecurity, darktrace, data science, database, deep learning, disability, email, human, intelligence, learning, machine, machine learning, ml, phishing, ransomware, salesforce, security, statistics, strategy, technology, threat intelligence, brute-force attack, monero (cryptocurrency), psychological resilience, telecommunication, understanding, virtual private network, ai4, ai4 2020, computer intelligence, cyber ai, marcus fowler
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Alex Fauvel talks identity management at CoinGeek Seoul

10/01/2019
Views 362
0
alex fauvel, asset, bitcoin, bitcoin sv, blockchain, bsv, company, competition, concept, cryptocurrency, data, encryption, identity management, information, money, on-chain, software , space, technology, brute-force attack, computer data storage, contract, cray, cut, copy, and paste, digital asset, evidence, sabbath, software release life cycle, soviet union, steganography, trail
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Citrix Synergy TV - SYN200 - Security analytics to protect users and their workspace

05/23/2019
Views 400
0
analytics, authentication, automation, big data, botnet, business, citrix synergy 2019, cloud, collaboration, computer security, email, enterprise, internet of things, machine learning, mentorship, mobility, networking, risk, software , technology, virtualization, active directory, brute-force attack, dark web, exploit (computer security), mobile phone, password, plug-in (computing), risk assessment, sim card, secure communication, the avengers (2012 film), understanding
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Code Signing Certificates

10/10/2019
Views 2.46 K
0
advanced persistent threats, apt, apt attack, cisco security, code signing, code signing certificates, crowdstrike, cyber defense summit, cyber security, cybersecurity, fireeye, fireeye cyber defense summit, fireeye cyber security, fortinet, javascript, malware, malware detection, palo alto networks, splunk, symantec, xml, zero day exploit, zero-day, antivirus software, backdoor (computing), brute-force attack, certificate authority, certificate revocation list, group policy, hacking team, kernel (operating system), microsoft smartscreen, online certificate status protocol, openoffice.org, portable executable, public key certificate, public key infrastructure, scripting language, specification (technical standard), vbscript, visual basic for applications, windows script host, windows vista, x.509
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

APT41 The Unending Game of Thrones

10/10/2019
Views 1.91 K
0
advanced persistent threats, apt, apt attack, apt groups, apt41, cisco security, crowdstrike, cyber security, cybersecurity, fireeye, fireeye cyber defense summit, fireeye cyber security, fortinet, malware, malware detection, palo alto networks, phishing, reverse engineering, sms, splunk, surveillance, symantec, zero day exploit, zero-day, brute-force attack, communication protocol, computer network, computer virus, cyberattack, cyberwarfare, data protection api, device driver, dynamic-link library, file system, international mobile subscriber identity, kernel (operating system), mobile phone, password, rootkit, shellcode, svchost.exe, transmission control protocol, tunneling protocol
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

On the Front Line with FireEye Email Security

10/10/2019
Views 482
0
advanced persistent threats, apt, apt attack, automation, cisco security, cloud computing, computer security, crowdstrike, cyber defense summit, cyber security, cybersecurity, economic growth, email, email security, fireeye, fireeye cyber defense summit, fireeye email, fireeye email security, fortinet, innovation, internet, machine learning, malware, malware detection, microsoft, mind, news, office 365, palo alto networks, phishing, productivity, sms, splunk, symantec, zero day exploit, zero-day, accounts payable, amazon alexa, antivirus software, brute-force attack, email spam, gmail, market (economics), password, simple mail transfer protocol
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

RSAC Innovation Sandbox 2020 - Elevate Security

02/24/2020
Views 2.26 K
0
behavior, brand, chief executive officer, competition, computer security, concept, culture, cybersecurity, data, feedback, information, infosec, innovation & startups, mining, organization, productivity, risk, rsa, rsac, rsaconference, science, security, technology, wall street, attention, bit, brute-force attack, elevator, hierarchy, quiz, reinforcement, the wall street journal
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

(In)Secure Web Applications

05/17/2018
Views 224
0
case studies, code, coding, computer security, conference, congress, database, developer, developing, education, europe, fixes, future, it, javascript, motivation, people, php, programmer, programming, programming language, software , tech, technology, tester, testing, vulnerability, wearedevelopers, wearedevs, web applications, wordpress, brute-force attack, computer file, cross-site scripting, http cookie, login, object-oriented programming, parameter (computer programming), patch (computing), penetration test, sql injection, string (computer science), theory, user (computing), web portal, world wide web, prepared statement
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

AppSecCali 2019 Lightning Talk - Building Cloud-Native Security for Apps and APIs with NGINX

01/24/2019
Views 434
0
api, appsec, cloud computing, cryptography , email, google, intelligence, internet, kubernetes , machine learning, microservices, neural network, nginx, owasp, snapchat, statistics, twitter, amazon (company), brute-force attack, criminal record, denial-of-service attack, http cookie, honeypot (computing), messaging apps, proxy server, telegraphy, datasheet
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

AppSecCali 2019 - Open-source OWASP tools to aid in penetration testing coverage

01/24/2019
Views 1.12 K
0
application security, appsec, hacker, java (programming language), owasp, software , software testing, web application, apache tomcat, brute-force attack, call stack, entry point, hypertext transfer protocol, login, password, penetration test, proxy server, rifle, scripting language, tank, visualization (graphics), white hat (computer security), world wide web, blitzkrieg, defence in depth, infiltration tactics, trench warfare
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

AppSecCali 2019 - Automated Account Takeover: The Rise of Single Request Attacks

01/24/2019
Views 1.81 K
0
appsec, appseccali, internet, internet of things, owasp, price, security token, self-driving car, xbox, android (operating system), apple inc., auction, brute-force attack, have i been pwned?, kinect, multi-factor authentication, multi-touch, online and offline, optical character recognition, password, recaptcha, user agent, image stitching, low-cost carrier, captcha, primesense
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

State Channels as a Scaling Solution for Cryptocurrencies - SBC '19

01/31/2019
Views 282
0
bitcoin, blockchain, competition, cryptocurrency, currency, mind, money, news, property, research, smart contract, tax, utility, youtube, attention, bank, brute-force attack, consensus (computer science), contract, cryptographic hash function, fee, lease, payment, receipt, signature
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Mix And Hex The Power Couple Of The Elixir Community

11/07/2019
Views 371
0
authentication, database, debugging, elixir, erlang, functional programming, hex, information security, web application, boolean data type, brute-force attack, command-line interface, computer file, entry point, environment variable, executable, library (computing), modular programming, multi-factor authentication, online and offline, password, reserved word, shortcut (computing), software bug, string (computer science), subroutine, template (c++), variable (computer science), master p
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Help Me Vulnerabilities You're My Only Hope

08/11/2019
Views 1.46 K
0
computer security, con, conference speakers, cyber security, dc27, def, def con 2019, def con 27, defcon, hacker, hacker community, hacker conference, hackers, hacking conference, ios, malware, security conference, security conference 2019, brute-force attack, communication protocol, file transfer protocol, firewall (computing), honeypot (computing), ip address, image scanner, internet protocol, internet forum, library (computing), password, patch (computing), router (computing), shell (computing), shell script, software release life cycle, symbolic link, transmission control protocol, wayback machine, web search engine, world wide web, zero-day (computing)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Web2Own Attacking Desktop Apps fromWeb Security's Perspective

08/08/2019
Views 763
0
computer security, con, conference speakers, cyber security, dc27, def, def con 2019, def con 27, defcon, email, google analytics, google chrome, hacker, hacker community, hacker conference, hackers, hacking conference, html, java (programming language), javascript, security conference, security conference 2019, wechat, application software, brute-force attack, classic mac os, cross-site scripting, desktop metaphor, domain name system, hostname, hyperlink, hypertext transfer protocol, library (computing), localhost, macintosh, password, scripting language, web browser
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Poking the S in SD Cards

08/09/2019
Views 1.79 K
0
communication, computer, computer security, con, conference speakers, cyber security, data, dc27, def, def con 2019, def con 27, defcon, flash memory, hacker, hacker community, hacker conference, hackers, hacking conference, microcontroller, operating system, pdf, security conference, security conference 2019, user interface, bit, blog, book, brute-force attack, communication protocol, cyclic redundancy check, data type, geforce, hdmi, interface (computing), laptop, password, sd card, serial peripheral interface, timing attack, usb, the flintstones
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
1 2
1-30 of 48