Black Hat Webcasts RSS Feed

Black Hat Webcasts RSS Feed

Podkast av Black Hat Briefings

Security news doesn't always wait for conference season. That's the guiding principle behind the Black Hat Webcasts – a regular series of live web events focusing on what's hot in the infosec space all year long. On the third Thursday of every month, we'll bring together Black Hat speakers, independent researchers and leading security experts from the government to the underground to answer your questions live.

Tidsbegrenset tilbud

3 Måneder for 9,00 kr

Deretter 99,00 kr / MånedAvslutt når som helst.

Kom i gang

Alle episoder

10 Episoder
episode Black Hat Webcast 10: Mobility and Security artwork
Black Hat Webcast 10: Mobility and Security

Overview: We're trying out a new format for the May 21 webcast on Mobility and Security. We're going to bring in some researchers and some industry folks and have a round-table discussion on the current state and future direction of securing the mobile devices we all can't live without. The idea behind this new style of presentation is to increase the amount of interactivity, both with the guests and the audience, so please join us and bring your ideas and questions. Alex Stamos, Founding Partner, iSEC Partners Charlie Miller, Principal Analyst, Independent Security Evaluators Vincenzo Iozzo, Student, Politecnico di Milano Roberto Gassira', Security Researcher, Mobile Security Lab Roberto Piccirillo, Security Researcher, Mobile Security Labbr

21. mai 2009 - 1 h 11 min
episode Black Hat Webcast 9: Europe 2009 Sneak Peek artwork
Black Hat Webcast 9: Europe 2009 Sneak Peek

Overview: Black Hat Europe is right around the corner - we'll be returning to Amsterdam April 14-17. We're very excited about the lineup of speakers we've put together, and this webcast will be a sort of sneak preview of what kind of presentations attendees will get to see at the live event. Webcast speakers include: Enno Rey and Daniel Mende All Your Packets Are Belong to Us - Attacking Backbone Technologies Charlie Miller and Vincenzo Iozzo Fun and Games Using In-Memory Execution on Mac OS X and iPhone Stefano Zanero adn Claudio Criscione Masibty: a Web Application Firewall Based on Anomaly Detection Roberto Gassira' and Roberto Piccirillo Hijacking Mobile Data Connections

25. mars 2009 - 1 h 19 min
episode Black Hat Webcast 8: Rich Internet Application Security artwork
Black Hat Webcast 8: Rich Internet Application Security

Rich Internet Application (RIA) frameworks are seeing an enormous growth in popularity - technologies like Ajax and Flash create nearly unlimited opportunities to expand and improve the web user experience. They also bring with them a host of new security risks. The popularity of these frameworks among application developers insures that we'll see more attacks and issues in the months and years ahead. Join Black Hat Founder and Director Jeff Moss and his guests Billy Hoffman of HP and Alex Stamos of iSec for a lively discussion of new issues and security implications in the world of Rich Internet Applications.

10. mars 2009 - 1 h 35 min
episode Black Hat Webcast 7: Mac OS X Security artwork
Black Hat Webcast 7: Mac OS X Security

Overview: Our seventh installment of the Black Hat Webcast Series arrives next week with an in-depth and fascinating look into the world of Mac Security. As the Mac platform grows in popularity both with the general public and the enterprise, we’ve seen an increase both in attacks and reasearcher interest in the topic of OS X Security. Black Hat Speaker Jesse D’Aguanno will be presenting on the topic of "Crafting OS X Kernel Rootkits – Fundamentals." We’ll also have a presentation by Tiller Beauchamp of IOActive will be making a presentation called "OS X Security - A year in Review". Please join me and our guests for what is sure to be a fascinat

24. jan. 2009 - 1 h 22 min
episode Black Hat Webcast 6: Database Forensics with David Litchfield artwork
Black Hat Webcast 6: Database Forensics with David Litchfield

Database Forensics expert David Litchfield will discuss his new tool and paper with Black Hat Founder and Director Jeff Moss and take questions from our webcast audience. The tool, orablock, allows a forensic investigator to dump data from a "cold" Oracle data file - i.e. there's no need to load up the data file in the database which would cause the data file to be modified, so using orablock preserves the evidence. Orablock can also be used to locate "stale" data - i.e. data that has been deleted or updated. It can also be used to dump SCNs for data blocks which can be useful during the examination of a compromised Oracle box.

23. des. 2008 - 1 h 21 min
Enkelt å finne frem nye favoritter og lett å navigere seg gjennom innholdet i appen
Enkelt å finne frem nye favoritter og lett å navigere seg gjennom innholdet i appen
Liker at det er både Podcaster (godt utvalg) og lydbøker i samme app, pluss at man kan holde Podcaster og lydbøker atskilt i biblioteket.
Bra app. Oversiktlig og ryddig. MYE bra innhold⭐️⭐️⭐️

Tidsbegrenset tilbud

3 Måneder for 9,00 kr

Deretter 99,00 kr / MånedAvslutt når som helst.

Eksklusive podkaster

Uten reklame

Gratis podkaster

Lydbøker

20 timer i måneden

Kom i gang

Bare på Podimo

Populære lydbøker