Search

Cris Neckar on the early days of securing Chrome Costin Raiu joins the XZ Utils backdoor investigation Katie Moussouris on building a different cybersecurity businesses Costin Raiu: The GReAT exit interview Danny Adamitis on an 'unkillable' router botnet used by Chinese .gov hackers Allison Miller talks about CISO life Rob Ragan on the excitement of AI solving security problems Seth Spergel on venture capital bets in cybersecurity Dan Lorenc on fixing the 'crappy' CVE ecosystem Cisco Talos researcher Nick Biasini on chasing APTs Allison Nixon on disturbing elements in cybercriminal ecosystem Dakota Cary on China's weaponization of software vulnerabilities Abhishek Arya on Google's AI cybersecurity experiments Dr Sergey Bratus on the 'citizen science' of hacking DARPA's Perri Adams on CTF hacking Ryan Hurst on tech innovation and unsolved problems in security Jason Chan on Microsoft's security problems GitHub security chief Mike Hanley on secure coding Jason Shockey Federico Kirschbaum on a life in the Argentina hacking scene Kymberlee Price reflects on life at the MSRC OpenSSF GM Omkhar Arasaratnam on open-source software security Serial entrepreneur Rishi Bhargava on building another cybersecurity company Claude Mandy on CISO priorities Sidra Ahmed Lefort dishes on VC investments and cyber uncertainties Paul Roberts on wins and losses in the 'right to repair' battle Katie Moussouris on where bug bounties went wrong Robinhood CSO Caleb Sima on a career in the security trenches Charlie Miller on hacking iPhones JAG-S on big-game malware hunting and a very mysterious APT Chainguard's Dan Lorenc gets real on software supply chain problems Vinnie Liu discusses a life in the offensive security trenches Down memory lane with Snort and Sourcefire creator Marty Roesch Subbu Rama Project Zero's Maddie Stone on the surge in zero-day discoveries Prof. Mohit Tiwari on the future of securing data at scale Google's Shane Huntley on zero-days and the nation-state threat landscape Lamont Orange Haroon Meer on the business of cybersecurity Tony Pepper Microsoft's Justin Campbell on offensive security research Costin Raiu on the .gov mobile exploitation business Amanda Gorton Intel's Venky Venkateswaran on hardware-enabled security Sounil Yu on SBOMs Algirde Pipikaite Josh Schwartz on red-teaming and proactive security engineering Michael Laventure Google's Heather Adkins on defenders playing the long game Collin Greene Alex Matrosov on the state of security at the firmware layer Charles Nwatu Doug Madory on the mysterious AS8003 global routing story Crossbeam CISO Chris Castaldo on securing the start-up Shubs Shah on finding riches (and lessons) from bug bounty hacking Fahmida Rashid Microsoft's David Weston on the surge in firmware attacks Lena Smart Patrick Howell O'Neill Nico Waisman Ron Brash on the water plant hacks and the state of ICS security Throwback: Zero-day exploit broker Chaouki Bekrar Selena Larson Fredrick Lee Zack Whittaker Jason Chan Andy Greenberg Matt Honea Brooke Pearson Tim MalcomVetter Matt Suiche Jaime Blasco Collin Mulliner Michael Piacente Dave Aitel Sounil Yu Andy Ellis Costin Raiu Josh Lefkowitz Christine Gadsby Chad Loder Chris Castaldo Wim Remes Dan Hubbard David Weston Rich Seiersen Andrew Morris Yoav Leitersdorf Juan Andrés Guerrero-Saade Robert M. Lee Brandon Dixon Ryan Huber Ivan Arce Sinan Eren Stephen Ridley Mischel Kwon Rick Holland Thomas Ptacek Zane Lackey Haroon Meer David (int eighty) Dennis Fisher Tim Maurer Will Lin Pete Chronis Brad Arkin Aanchal Gupta Tom Conklin John Terrill Christopher Ahlberg Masha Sedova Paul Roberts Dino Dai Zovi Sharon Anolik Kim Zetter Kelly Jackson Higgins Katie Moussouris
africa AI AI Cyber Challenge AIxCC AMP android anti-exploitation anti-virus Apple appsec APT APT attribution APT29 APTs argentina Artifical Intelligence artificial intelligence as8003 Atlantic Council attack surfaces attribution automation balkanid Balkanization BGP BGP hijacking bios bitcoin black hat blackberry blue team breach detection browsers bug bounties bugbounty business continuity canaries candiru Career career guidance CET Chainguard China chrome Chrome Flex OS Cisco Talos CISO CISO liability CISO movements CISOs client security code quality codecov coinbase community building compliance continuous testing core security corellium corona virus covid credential theft crisis management critical infrastructure crowdstrike cryptojacking csam CVE cyber espionage cyber-insurance cybersecurity cybersecurity business cyberwar dan kaminsky Dark Reading DARPA Dartmouth data guard data privacy data security Davos DEF CON CTF diplomacy disclosure diversity dspm Duqu eclypsium ekoparty email email security emulation encryption Engagement entrepreneurship exploit brokers exploit sales exploits facebook firmware Fraud Prevention funding generative ai global routing godaddy google GReAT h2c smuggling hardware hardware security hiring ics Identity and Access ids iga insurance intel internet backbone investments investments and exits iOS iOS 14.5 iOS malware ios self-driving cars IOT iphone ips ipv4 jeep jiu-jitsu jobs market journalism key management Kim Zetter labscon Lapsu$ layoffs Lazarus leadership LLMs log4j log4shell macbook MacOS malware campaigns marketing marty roesch memory corruption memory forensics Memory Safety Merlin Ventures messaging metador microsoft mobile mobile stock trading monoculture msrc nation-state nation-state APTs nation-state malware netography network security news gathering NIST npm NSO Group NSO Pegasus offense vs defense offensive security open source software open-source pandemic parsers patch tuesday PDF pegasus pen-testing penetration testing print spooler printnightmare privacy privacy engineering product security Project Zero PSOAs public cloud pwn2own Q&A ransomware recruiting Red October red team remediation risk management robinhood routers RPISEC rsa conference rsac saas SafeDocs Sandboxing SBOM SBOMs scada Scattered Spider secure coding security security assessments security awareness security framework security updates securityawareness securityresponse self-driving cars sentinellabs serverless shift-left simulated hacking attacks skills-shortage slack snort SOC solarwinds sourcefire spectre spyware startup startups story-telling Storytelling Stuxnet sunburst supply chain teams tesla hack the-com thinkst third-party risk threat detection threat-hunting threat-intel threatintel tpm sniffing transcript transparency typosquatting uefi uefi malware ukraine VC funding venture capital virtualization Volt Typoon vpn vulnerabilities vupen web app security webapp security whatsapp windows windows os wipers writing XZ Utils zero-day Zero-days zero-trust zerodium Zoom
|

This site uses cookies and may process personal data based on our Privacy Policy