Search
Cris Neckar on the early days of securing Chrome
Costin Raiu joins the XZ Utils backdoor investigation
Katie Moussouris on building a different cybersecurity businesses
Costin Raiu: The GReAT exit interview
Danny Adamitis on an 'unkillable' router botnet used by Chinese .gov hackers
Allison Miller talks about CISO life
Rob Ragan on the excitement of AI solving security problems
Seth Spergel on venture capital bets in cybersecurity
Dan Lorenc on fixing the 'crappy' CVE ecosystem
Cisco Talos researcher Nick Biasini on chasing APTs
Allison Nixon on disturbing elements in cybercriminal ecosystem
Dakota Cary on China's weaponization of software vulnerabilities
Abhishek Arya on Google's AI cybersecurity experiments
Dr Sergey Bratus on the 'citizen science' of hacking
DARPA's Perri Adams on CTF hacking
Ryan Hurst on tech innovation and unsolved problems in security
Jason Chan on Microsoft's security problems
GitHub security chief Mike Hanley on secure coding
Jason Shockey
Federico Kirschbaum on a life in the Argentina hacking scene
Kymberlee Price reflects on life at the MSRC
OpenSSF GM Omkhar Arasaratnam on open-source software security
Serial entrepreneur Rishi Bhargava on building another cybersecurity company
Claude Mandy on CISO priorities
Sidra Ahmed Lefort dishes on VC investments and cyber uncertainties
Paul Roberts on wins and losses in the 'right to repair' battle
Katie Moussouris on where bug bounties went wrong
Robinhood CSO Caleb Sima on a career in the security trenches
Charlie Miller on hacking iPhones
JAG-S on big-game malware hunting and a very mysterious APT
Chainguard's Dan Lorenc gets real on software supply chain problems
Vinnie Liu discusses a life in the offensive security trenches
Down memory lane with Snort and Sourcefire creator Marty Roesch
Subbu Rama
Project Zero's Maddie Stone on the surge in zero-day discoveries
Prof. Mohit Tiwari on the future of securing data at scale
Google's Shane Huntley on zero-days and the nation-state threat landscape
Lamont Orange
Haroon Meer on the business of cybersecurity
Tony Pepper
Microsoft's Justin Campbell on offensive security research
Costin Raiu on the .gov mobile exploitation business
Amanda Gorton
Intel's Venky Venkateswaran on hardware-enabled security
Sounil Yu on SBOMs
Algirde Pipikaite
Josh Schwartz on red-teaming and proactive security engineering
Michael Laventure
Google's Heather Adkins on defenders playing the long game
Collin Greene
Alex Matrosov on the state of security at the firmware layer
Charles Nwatu
Doug Madory on the mysterious AS8003 global routing story
Crossbeam CISO Chris Castaldo on securing the start-up
Shubs Shah on finding riches (and lessons) from bug bounty hacking
Fahmida Rashid
Microsoft's David Weston on the surge in firmware attacks
Lena Smart
Patrick Howell O'Neill
Nico Waisman
Ron Brash on the water plant hacks and the state of ICS security
Throwback: Zero-day exploit broker Chaouki Bekrar
Selena Larson
Fredrick Lee
Zack Whittaker
Jason Chan
Andy Greenberg
Matt Honea
Brooke Pearson
Tim MalcomVetter
Matt Suiche
Jaime Blasco
Collin Mulliner
Michael Piacente
Dave Aitel
Sounil Yu
Andy Ellis
Costin Raiu
Josh Lefkowitz
Christine Gadsby
Chad Loder
Chris Castaldo
Wim Remes
Dan Hubbard
David Weston
Rich Seiersen
Andrew Morris
Yoav Leitersdorf
Juan Andrés Guerrero-Saade
Robert M. Lee
Brandon Dixon
Ryan Huber
Ivan Arce
Sinan Eren
Stephen Ridley
Mischel Kwon
Rick Holland
Thomas Ptacek
Zane Lackey
Haroon Meer
David (int eighty)
Dennis Fisher
Tim Maurer
Will Lin
Pete Chronis
Brad Arkin
Aanchal Gupta
Tom Conklin
John Terrill
Christopher Ahlberg
Masha Sedova
Paul Roberts
Dino Dai Zovi
Sharon Anolik
Kim Zetter
Kelly Jackson Higgins
Katie Moussouris
africa
AI
AI Cyber Challenge
AIxCC
AMP
android
anti-exploitation
anti-virus
Apple
appsec
APT
APT attribution
APT29
APTs
argentina
Artifical Intelligence
artificial intelligence
as8003
Atlantic Council
attack surfaces
attribution
automation
balkanid
Balkanization
BGP
BGP hijacking
bios
bitcoin
black hat
blackberry
blue team
breach detection
browsers
bug bounties
bugbounty
business continuity
canaries
candiru
Career
career guidance
CET
Chainguard
China
chrome
Chrome Flex OS
Cisco Talos
CISO
CISO liability
CISO movements
CISOs
client security
code quality
codecov
coinbase
community building
compliance
continuous testing
core security
corellium
corona virus
covid
credential theft
crisis management
critical infrastructure
crowdstrike
cryptojacking
csam
CVE
cyber espionage
cyber-insurance
cybersecurity
cybersecurity business
cyberwar
dan kaminsky
Dark Reading
DARPA
Dartmouth
data guard
data privacy
data security
Davos
DEF CON CTF
diplomacy
disclosure
diversity
dspm
Duqu
eclypsium
ekoparty
email
email security
emulation
encryption
Engagement
entrepreneurship
exploit brokers
exploit sales
exploits
facebook
firmware
Fraud Prevention
funding
generative ai
global routing
godaddy
google
GReAT
h2c smuggling
hardware
hardware security
hiring
ics
Identity and Access
ids
iga
insurance
intel
internet backbone
investments
investments and exits
iOS
iOS 14.5
iOS malware
ios self-driving cars
IOT
iphone
ips
ipv4
jeep
jiu-jitsu
jobs market
journalism
key management
Kim Zetter
labscon
Lapsu$
layoffs
Lazarus
leadership
LLMs
log4j
log4shell
macbook
MacOS
malware campaigns
marketing
marty roesch
memory corruption
memory forensics
Memory Safety
Merlin Ventures
messaging
metador
microsoft
mobile
mobile stock trading
monoculture
msrc
nation-state
nation-state APTs
nation-state malware
netography
network security
news gathering
NIST
npm
NSO Group
NSO Pegasus
offense vs defense
offensive security
open source software
open-source
pandemic
parsers
patch tuesday
PDF
pegasus
pen-testing
penetration testing
print spooler
printnightmare
privacy
privacy engineering
product security
Project Zero
PSOAs
public cloud
pwn2own
Q&A
ransomware
recruiting
Red October
red team
remediation
risk management
robinhood
routers
RPISEC
rsa conference
rsac
saas
SafeDocs
Sandboxing
SBOM
SBOMs
scada
Scattered Spider
secure coding
security
security assessments
security awareness
security framework
security updates
securityawareness
securityresponse
self-driving cars
sentinellabs
serverless
shift-left
simulated hacking attacks
skills-shortage
slack
snort
SOC
solarwinds
sourcefire
spectre
spyware
startup
startups
story-telling
Storytelling
Stuxnet
sunburst
supply chain
teams
tesla hack
the-com
thinkst
third-party risk
threat detection
threat-hunting
threat-intel
threatintel
tpm sniffing
transcript
transparency
typosquatting
uefi
uefi malware
ukraine
VC funding
venture capital
virtualization
Volt Typoon
vpn
vulnerabilities
vupen
web app security
webapp security
whatsapp
windows
windows os
wipers
writing
XZ Utils
zero-day
Zero-days
zero-trust
zerodium
Zoom
04.07.2021 | 4'' read
The return of in-person security events
This week, we respond to news that Solarwinds CEO will do a keynote (fireside chat) at next month's RSA Conference and how Black Hat is shaping up as the official return to in-person security events. Plus, three new podcast episodes on a variety of topics.
Read