BSides Cleveland 2018, Tom Eston’s ‘Using Technology To Defend Digital Privacy & Human Rights’

Videography Credit: Irongeek (Adrian Crenshaw).
Permalink
The post BSides Cleveland 2018, Tom Eston’s ‘Using Technology To Defend Digital Privacy & Human Rights’ appeared first on Security Boulevard.
Continue reading BSides Cleveland 2018, Tom Eston’s ‘Using Technology To Defend Digital Privacy & Human Rights’

BSides Cleveland 2018, Christine Stevenson’s ‘Go Hack Yourself: Moving Beyond Assumption-Based Security’

Videography Credit: Irongeek (Adrian Crenshaw).
The post BSides Cleveland 2018, Christine Stevenson’s ‘Go Hack Yourself: Moving Beyond Assumption-Based Security’ appeared first on Security Boulevard.
Continue reading BSides Cleveland 2018, Christine Stevenson’s ‘Go Hack Yourself: Moving Beyond Assumption-Based Security’

BSides Cleveland 2018, Celeste Hall’s ‘One Puzzle Piece at a Time: Logging Quick Wins’

*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://www.infosecurity.us/blog/2018/8/25/bsides-cleveland-2018-celeste-halls-one-puzzle-piece-at-a-time-logging-quick-… Continue reading BSides Cleveland 2018, Celeste Hall’s ‘One Puzzle Piece at a Time: Logging Quick Wins’

BSides Cleveland 2018, Matt Scheurer’s ‘Active Defense – Helping Threat Actors Hack Themselves!

Videography by Irongeek (Adrian Crenshaw).
The post BSides Cleveland 2018, Matt Scheurer’s ‘Active Defense – Helping Threat Actors Hack Themselves! appeared first on Security Boulevard.
Continue reading BSides Cleveland 2018, Matt Scheurer’s ‘Active Defense – Helping Threat Actors Hack Themselves!

The digital entropy of death: BSides Manchester

What happens to online accounts when we die? Not a cheerful subject by any stretch of the imagination, but one we covered at BSides Manchester.
Categories:

101

Tags: after we diebsidesBSides Manchesterdeathdigital entropy of deathdigital real e… Continue reading The digital entropy of death: BSides Manchester

DoD unveils ‘Hack the Marine Corps’ bounty program

A new bug bounty program intended to find vulnerabilities in the Marine Corps’ public-facing websites was unveiled in Las Vegas Monday. The Hack the Marine Corps program, which was jointly created by the Department of Defense (DoD) and vulnerability disclosure platform company HackerOne, was announced on August 12 with a live hacking event. Hackers discovered 75 unique vulnerabilities during the event and were awarded over $80,000. During the event, nearly 100 “hand-selected” hackers worked for 9 hours to expose vulnerabilities in the Marine Corps’ websites and public services. The hackers were split into offensive and defensive teams, and worked alongside Marines from the U.S. Marine Corps Cyberspace Command (MARFORCYBER).  The bug bounty program will run until August 26.  “Success in cybersecurity is about harnessing human ingenuity,” said HackerOne CEO Marten Mickos. “There is no tool, scanner, or software that detects critical security vulnerabilities faster or more completely than hackers. The Marine […]

The post DoD unveils ‘Hack the Marine Corps’ bounty program appeared first on Cyberscoop.

Continue reading DoD unveils ‘Hack the Marine Corps’ bounty program

BSidesLV Preview: Planning For The Worst, and Watch Out For That Bus!

Bad circumstances happen to us and our technology. Fire, flood, sickness, and death can surprise us, our families, and our technology. While we may not be able to control all aspects of life, we can be prepared. At any time, you might metaphorically ge… Continue reading BSidesLV Preview: Planning For The Worst, and Watch Out For That Bus!

BSides Springfield Preview: How To DevOps (While Sneaking in Security)

As companies embrace the DevOps phenomenon in hopes of producing applications at a faster rate, they are also introducing insecure software into the digital ecosystem. DevOps, itself, is a software lifecycle movement which blends developmental and oper… Continue reading BSides Springfield Preview: How To DevOps (While Sneaking in Security)