Speaker: Reinhold Wochner @ Raiffeisen Bank International
Please Note - Speaker presentations represent the views of the individual speakers
Speaker: Reinhold Wochner @ Raiffeisen Bank International
Please Note - Speaker presentations represent the views of the individual speakers
Speaker: Bikash Barai [ Founder & CEO @ Cigital, Inc]
Please Note - Speaker presentations represent the views of the individual speakers and
CISO Platform Annual Summit @ Goa, last week saw over 100+ attendees for over 2 days making the the spirit of knowledge sharing and learning a huge success in the Information Security Executives of India. Here are the highlights of the awesome keynot
Speaker: Matt Suiche, Co - Founder & Chief Scientist @ Cloud Volumes
Please Note - Speaker presentations represent the views of the individu
Speaker: Tamaghna Basu, CEO @ neoEYED
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Pla
Speaker: Kenneth Bradberry, CTO @ Xerox Healthcare
Please Note - Speaker presentations represent the views of the individual speakers and no
Our editorial team has handpicked some great talks from Black Hat Conference - one of the largest IT Security Conference in the world.
Black Hat - built by and for the global InfoSec community - returns to Las Vegas for its 19th year. This six day e
Our editorial team has handpicked some great talks from Black Hat Conference - one of the largest IT Security Conference in the world.
Black Hat - built by and for the global InfoSec community - returns to Las Vegas for its 19th year. This six day
Timing attacks have never been so practical: Advance cross site search attacks
Cross-site search (XS-search) is a practical timing side-channel attack that allows the extraction of sensitive information from web-services. The attack exploits inflatio
Intra process memory protection for applications on ARM and x86
Today's software needs to isolate not only processes but the many components *within* a process from each other. Process-level isolation via jails, sandboxes, VMs, or hypervisors is final
Demystifying Secure enclave processor
The secure enclave processor (SEP) was introduced by Apple as part of the A7 SOC with the release of the iPhone 5S, most notably to support their fingerprint technology, Touch ID. SEP is designed as a security c
Breaking hardware enforced security with hypervisors
Hardware-Enforced Security is touted as the panacea solution to many modern computer security challenges. While certainly adding robust options to the defenders toolset, they are not without their
Samsung pay: tokenized numbers flaws and issues
Samsung announced many layers of security to its Pay app. Without storing or sharing any type of user's credit card information, Samsung Pay is trying to become one of the most secure approaches offering
Applied Machine learning for data exfiltration and other fun topics
The goal of this presentation is to help researchers, analyst, and security enthusiast get their hands dirty applying machine learning to security problems. We will walk the entire pi
Memory forensics using VMI for cloud computing
The relocation of systems and services into cloud environments is on the rise. Because of this trend users lose direct control over their machines and depend on the offered services from cloud providers.
Building trust and Enabling innovation for voice enabled IOT
Voice enabled technology provides developers with great innovation opportunities as well as risks. The Voice Privacy Alliance created a set of 39 Agile security stories specifically for voic
Breaking Kernal address space layout rendomization: KASLAR with Intel TSX
Kernel hardening has been an important topic, as many applications and security mechanisms often consider the kernel their Trusted Computing Base (TCB). Among various hardenin
Attacking bluetooth smart devices: introducing a new BLE proxy tool
Bluetooth Low Energy is probably the most thriving technology implemented recently in all kinds of IoT devices: gadgets, wearables, smart homes, medical equipment and even banking tok
Account jumping post infection persistency and lateral movement in AWS
The widespread adoption of AWS as an enterprise platform for storage, computing and services makes it a lucrative opportunity for the development of AWS focused APTs. We will cover
A lightbulb worm
Could a worm spread through a smart light network? This talk explores the idea, and in particular dives into the internals of the Philips Hue smart light system, and details what security has been deployed to prevent this.
Examples of