Using Market Pressures to Improve Cybersecurity
Dark Reading Videos | 8/31/2017 | Post-MedSec, Chris Wysopal discusses what impact the investor community -- if not consumers -- can have on squashing vulnerabilities and improving cybersecurity.
The Active Directory Botnet
Dark Reading Videos | 8/30/2017 | It's a nightmare of an implementation error with no easy fix. Ty Miller and Paul Kalinin explain how and why an attacker could build an entire botnet inside your organization.
IoTCandyJar: A HoneyPot for any IoT Device
Dark Reading Videos | 8/29/2017 | Palo Alto Networks researchers explain how they designed an affordable, behavior-based honeypot to detect attacks on an IoT device -- any kind of IoT device.
Cybersecurity: An Asymmetrical Game of War
To stay ahead of the bad guys, security teams need to think like criminals, leverage AI’s ability to find malicious threats, and stop worrying that machine learning will take our jobs.
Turning Sound Into Keystrokes: Skype & Type
Dark Reading Videos | 8/25/2017 | Don't let your fingers do the talking in a Skype session. The callers on the other end could know what you're writing, researcher Daniele Lain explains.
How to Hack a Robot
Forget 'killer robots:' researchers demonstrate how collaborative robots, or 'cobots,' can be hacked and dangerous.
ShieldFS Hits 'Rewind' on Ransomware
Dark Reading Videos | 8/18/2017 | Federico Maggi and Andrea Continella discuss a new tool to protect filesystems by disrupting and undoing ransomware's encryption activities.
The Shadow Brokers: How They Changed 'Cyber Fear'
Dark Reading Videos | 8/17/2017 | At Black Hat USA, Matt Suiche, founder of Comae Technologies, describes what we know about the Shadow Brokers and how they have changed the business of cyber fear.
|