ashar

joined 2 years ago
MODERATOR OF
 

The CRAZY world of ransomware - keynote by cybersecurity expert Graham Cluley

Ransomware. It’s probably the most damaging type of malicious software in existence today.

Hundreds and hundreds of millions of dollars have been stolen from companies and individuals through ransomware attacks, making it one of the most effective weapons in the arsenal of organised cybercriminal gangs.

Cybersecurity veteran Graham Cluley explains some of the crazier goings-on from the world of ransomware.

Graham Cluley is an award-winning independent security blogger, researcher, podcaster, and public speaker. He has been a well-known figure in the computer security industry since the early 1990s when he worked as a programmer, writing the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows.

Since then he has been employed in senior roles by companies such as Sophos and McAfee.

 

Nullcon Goa 2023 playlist

Schedule from the website

Nullcon came into existence in 2010 and is managed and marketed by Payatu Technologies Pvt Ltd. With the advent of cutting-edge technologies, security is crucial as technology brings a myriad of threats along. Moreover, we want to assure you that we are there for you. In our conference, you get to connect with various people and gain insights from them to stay ahead in the cyberspace. Nullcon was conceived from null - The Open Security Community, a registered not-for-profit society, and the largest active security community in India.

 

Nullcon Berlin 2023 Playlist

Schedule from the website

Nullcon came into existence in 2010 and is managed and marketed by Payatu Technologies Pvt Ltd. With the advent of cutting-edge technologies, security is crucial as technology brings a myriad of threats along. Moreover, we want to assure you that we are there for you. In our conference, you get to connect with various people and gain insights from them to stay ahead in the cyberspace. Nullcon was conceived from null - The Open Security Community, a registered not-for-profit society, and the largest active security community in India.

 

Next Level Curl - Daniel Stenberg

Everyone uses curl, the Swiss army knife of Internet transfers. Earlier this year we celebrated curl’s 25th birthday, and while this tool has provided a solid set of command line options for decades, new ones are added over time.

This talk is a look at some of the most powerful and interesting additions to curl in recent years. The perhaps lesser-known curl tricks that might enrich your command lines, extend your “tool belt” and make you more productive. Also trurl, the recently created companion tool for URL manipulations you maybe did not realize you wanted.

 

WICCON 2023 playlist 14 videos

Schedule from website

WICCON RECOGNIZES AND SHOWCASES WOMEN’S SUCCESS IN THE CYBERSECURITY FIELD. WE WANT TO INSPIRE THE REST OF THE COMMUNITY TO PURSUE A CAREER IN SECURITY AND DEMONSTRATE HOW WOMEN CAN BE SUCCESSFUL SUBJECT MATTER EXPERTS. THE HARD STUFF DOESN’T SCARE US, AND WE’RE READY TO TALK ABOUT WHAT TRULY MATTERS IN THE FIELD.

3
submitted 2 years ago* (last edited 2 years ago) by ashar to c/security_cpe
 

fwd:cloudsec is a non-profit conference on cloud security. June 12-13, 2023 in Anaheim, CA

Playlist

Abstracts and Speaker bios

#CPE

#Infosec

 

Scott (Piper)’s AWS Security Maturity Roadmap is the definitive resource for cloud-native companies to build a security program and posture in AWS. It does an amazing job at providing broadly applicable guidance along the maturity curve. However, for many fwd:cloudsec attendees, the roadmap ends too soon.

In my experience there is a set of technical capabilities and controls that companies should consider once they’ve “shipped the roadmap.” In this talk, I’ll take you on a rapid fire tour beyond Scott’s paved road, focusing on the problems you’ll encounter scaling a cloud security program. A key framework will be “build versus buy,” and the talk will be opinionated about where cloud security teams can fall into the trap of undifferentiated work.

The goal is to walk away with a clear view of the possibilities at the leading edge of cloud security, risk-informed guidance on priorities, and a crucial new reference for writing cloud security roadmaps.

 

Hardwear.io was conceptualized to provide the hardware & security community with a platform exclusively focusing on discussing & solving hardware security issues.

Hardwear.io USA 2023 - playlist

Schedule from the website

2
submitted 2 years ago* (last edited 2 years ago) by ashar to c/security_cpe
 

Quantum and Post-Quantum Crypto by Les Bell

A high-level overview of quantum cryptology, covering basic quantum mechanics, quantum computing, quantum cryptography (quantum key distribution), quantum cryptanalysis (Shor's algorithm and Grover's algorithm), post-quantum cryptography and cryptographic agility.

Table of Contents:

00:00 - Introduction

00:31 - Outline

01:05 - Quantum Mechanics

13:13 - Quantum Computing

15:32 - “The Talk”

17:09 - Quantum Key Distribution

23:45 - Observation of Photons

27:19 - BB84 Quantum Key Distribution

30:29 - BB84 Reconciliation Stage

32:41 - Reconciliation Example

34:43 - Privacy Amplification

37:06 - Shor’s Algorithm

42:14 - The Quantum Circuit

43:04 - An Example of Shor’s Algorithm

43:22 - Presentation Paused

43:36 - Presentation Resumed

44:35 - An Example of Shor’s Algorithm

46:20 - Grover’s Algorithm

48:54 - Conclusions

51:14 - Post-Quantum Crypto

52:52 - NTRU

54:45 - McEliece Cryptosystem

56:58 - Google Trials

58:46 - Cryptographic Agility

1:01:53 - NSA CNSAS

1:04:35 - References and Further Reading

view more: ‹ prev next ›