August 9th, 2019 📆 | 3930 Views ⚑
Modeling for threats forces an adversarial lens for security operations team members. Via evidence backed attack simulations, security operations centers
April 6th, 2019 📆 | 3523 Views ⚑
Stuart Criddle, Principal Security Consultant & Brendan Saunders, Senior Security Consultant, NCC: Practical Security Assessments of IoT Devices and Systems
September 4th, 2018 📆 | 5267 Views ⚑
Bug Bounties – Working Towards a Fairer and Safer Marketplace With rapid growth in the bug bounty marketplace, the CREST
June 28th, 2018 📆 | 4890 Views ⚑
Saurabh Harit, Spirent talks about vulnerabilities that exist in 3rd party web apps at CRESTCon & IISP Congress 2018-06-28 08:34:05
December 14th, 2017 📆 | 3391 Views ⚑
2017-12-13 22:29:35 source
July 9th, 2016 📆 | 3751 Views ⚑
2016-07-09 11:56:37 source
July 9th, 2016 📆 | 7781 Views ⚑
2016-07-09 10:50:33 source
May 15th, 2015 📆 | 3922 Views ⚑
Stuart Criddle, Principal Security Consultant & Brendan Saunders, Senior Security Consultant, NCC: Practical Security Assessments of IoT Devices and Systems
June 16th, 2014 📆 | 2004 Views ⚑
Andrea Simmons, Chief Information Security Officer, HP Enterprise Services talks about her role, how she got into the industry and
June 3rd, 2014 📆 | 3964 Views ⚑
Tim Varkalis, penetration tester at PWC talks about a day in his working life and provides advice for getting into
November 7th, 2013 📆 | 6127 Views ⚑
Melissa Augustine, McAfee talks about her presentation at CRESTCon & IISP Congress 2013. ‘Memory Forensics – finding what isn’t there’
Comments