All Posts (2717)

Sort by

A virus-like cyberattack spreading over the air may sound far-fetched, but new research proves the airborne attack surface is here. Join the Armis researchers who discovered the viral IoT vulnerability, BlueBorne, as they walk through the airborne th

Read more…
Views: 74
Comments: 0

Machine learning is a powerful new tool that can be used for security applications (for example, to detect malware) but machine learning itself introduces many new attack surfaces. For example, attackers can control the output of machine learning mod

Read more…
Views: 146
Comments: 0

OAuth 2.0 Threat Landscapes

OAuth 2.0 is at the heart of OpenID Connect, Mobile Connect, UMA and many other popular standards. Understanding the threat landscapes in OAuth 2.0 is essential in building a secured identity infrastructure. This talk will guide you through multiple

Read more…
Views: 42
Comments: 0

Join The Community Discussion