All Posts (2290)

Sort by

Securing the “Weakest Link”

Securing the “Weakest Link”

Security professionals often call people “the weakest link.” We claim that they'll always make mistakes, however hard we try, and throw up our hands. But the simple truth is that we can help people do well at a wide varie

Read more…
Views: 73
Comments: 0

The Art of Hacking a Human

The Art of Hacking a Human

This session will review security techniques on how to navigate different personalities using traditional hacking techniques. Determine what “operating system” they are running. What patches are in place? What vulnerabilit

Read more…
Views: 120
Comments: 0

Proactive Measures to Mitigate Insider Threat

Proactive Measures to Mitigate Insider Threat

The threat posed by rogue insiders affects every organization worldwide. The difficulties in balancing employees’ legitimate need to access corporate data along with the need to compartmentalize access a

Read more…
Views: 119
Comments: 0

Building an Android Scale Incident Response Process

The Android ecosystem has over one billion active devices from hundreds of OEMs and carrier networks. The Android Security Team will explain how the ecosystem is able to respond quickly and effecti

Read more…
Views: 119
Comments: 0

Finding Triggered Malice in Android Apps

Finding Triggered Malice in Android Apps

Traditional techniques to detect malice in Android apps struggle to identify trigger-based changes to application logic. Unfortunately, such triggers are a key component of targeted malware, where the trigger

Read more…
Views: 111
Comments: 0

How to Analyze an Android Bot

How to Analyze an Android Bot

This presentation will demonstrate a complete end-to-end analysis of an Android bot. This will include the decompilation and static analysis of bot code and the dynamic analysis of the bot’s behavior in a controlled san

Read more…
Views: 137
Comments: 0

Android Serialization Vulnerabilities Revisited

Android Serialization Vulnerabilities Revisited

This session is about Android Serialization vulnerabilities. We revisit two vulns found in Android (CVE-2014-7911, CVE-2015-3837) which allowed for privilege escalation. We also present vulns found in

Read more…
Views: 107
Comments: 0

Hacking Exposed: The Mac Attack

Hacking Exposed: The Mac Attack

Windows attacks receive all the attention. However, Mac and Linux have gained in popularity with the adversary. This session will focus on common Mac attack vectors and other cross-platform hacks that are typically se

Read more…
Views: 110
Comments: 0

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

CISO Platform: CISO 100 Awards & Future CISO Awards, USA 2025

  • Description:

     

    Nominate for the CISOPlatform CISO 100 Awards & Future CISO Awards - Recognizing Cybersecurity Leaders. We're reaching out to you because we believe you know someone deserving of this prestigious accolade....Nominate your colleague, mentor, someone you admire or yourself !

    For more details: Click Here

    Nominate Yourself (Last Date 15th Feb 2025): …

  • Created by: Biswajit Banerjee