August 2014 Blog Posts (38)

14 Things to Consider While Defining a GRC Framework

Information Security function had to be aligned to Risk Management function to provide independence by separating Infosec Governance and Infosec operations responsibilities. Enhancement in the policy was focused on the wider and strategic modifications, faster adoption of emerging technologies and empowering all stakeholders.

(Read more:  Top 5 Big Data Vulnerability…

Continue

Added by pritha on August 29, 2014 at 1:30pm — No Comments

Top Talks from Defcon - The Largest Hacker Conference ( Part 2 )



This is the second compilation of Best Of Defcon 22 at a glance. The following Links will link you to the respective complete PPT. 

Important Note:

  • All presentations are courtesy Defcon and is presented as-is without any modification
  • Some of the descriptions below are taken from Defcon website (www.defcon.org)
  • You need…
Continue

Added by pritha on August 29, 2014 at 1:30pm — No Comments

Top Talks from Defcon - The Largest Hacker Conference ( Part 1 )

Defcon 22, the largest conference for hackers with 15,000 attendees saw some of the most interesting researches in the field of security and hacking. From hundreds of talks, we have handpicked the top presentations which are relevant for security managers and leaders.

Important Note:

  • All presentations are courtesy Defcon and is presented as-is without any modification
  • Some of the…
Continue

Added by pritha on August 16, 2014 at 4:30pm — No Comments

Defcon, Turing Machine & Halting Problem: "Why is it easier to hack than to defend?"

Defcon is the time when I have no business meetings and am quite disconnected with the world. A good time to immerse myself in my own thoughts. Last week during Defcon @ Las Vegas, I was thinking on how difficult it is build a secure system. We get amazed by hacking various stuff but is lot more amazing to think how tough it is to build a secure…

Continue

Added by bikash on August 14, 2014 at 9:30am — No Comments

Bypass Firewalls, Application White Lists, Secure Remote Desktops in 20sec

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 3:30am — No Comments

Detecting & Defending Against State-Actor Surveillance

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

Check your Fingerprints: Cloning the Strong Set

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

From ROOT to Special: Hacking IBM Mainframes

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

Easy to Use Phone DDOS

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

One-Man Shop: How to Build a Functional Security Program with Limited Resources

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

From Raxacoricofallapatorius With Love: Case Studies in Insider Threats

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

RF Pentesting Your Air Stinks

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

Adventures in Disruption, Destruction & Death

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

Cyber-hijacking Airplanes

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

Attacking the Internet of Things

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

Instrumenting Point-of-Sale Malware

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

Am I Being Spied On?

(Source: Defcon 22-Las Vegas)

(Read more:  APT Secrets that Vendors Don't Tell)…

Continue

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

Abusing Software Defined Networks

Added by CISO Platform on August 14, 2014 at 2:49am — No Comments

Mass Scanning the Internet

Added by CISO Platform on August 14, 2014 at 2:47am — No Comments

VoIP Wars: Attack of the Cisco Phones

Added by CISO Platform on August 14, 2014 at 2:43am — No Comments

Monthly Archives

2019

2018

2017

2016

2015

2014

2013

2012

1999

Follow Us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2019   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts