Skip to main content
1 - 12 of 16 results
Items per page:
Cross Site Scripting (XSS) has always been one of the Top 10 application vulnerabilities according to OWASP. This is a security vulnerability in web application...
The Galileo program represents the biggest program in Europe related to the Navigation Systems. The session will highlight the main challenges to plan cyber-aud...
Using live demonstrations, we'll show how systemic issues can lead to IoT devices being hacked and exploited, and examine why authorities still fail to deal wit...
As we continue to see the threat landscape evolve, with attackers learning lessons along the way, the latest threat vectors are arising where we least expect th...
Chaos engineering can be used to test the resiliency of cloud security and compliance. This session will include a primer on cloud security chaos engineering, a...
RPA brings in dramatic efficiencies, reduces the documentation burden and audit fatigue along with round the clock monitoring. RPA is the first step towards bui...
Lessons learned in Google engineering about how tools are ideally placed to preserve important security properties. This talk discusses template languages, a wi...
Based on research from Goldsmith University we shall discuss how Artificial Intelligence used for fraud investigation can be the preventative answer to reducing...
IoT devices are available for every corner of our homes and workplaces. Numerous articles, studies, and exploits have been published on the security (or lack of...
Compliance, best practices, and regulation all drive a security program. These programs pass audit and compliance checks, have robust patch management, and cond...
The explosion of APIs is creating incremental security risks that must be addressed, considering that over half of the internet traffic is bot or API based. Aft...
While a great deal of emphasis is given on securing different components of a device ecosystem, one often misses that the time of an attack, and the time of thr...
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.