conferences
![HITBSecConf](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113642/hitb-2016ams-400x200.png)
HITB Security Conference in Amsterdam to feature innovative research on attack and defense topics
The agenda for Day 1 of the 9th annual HITB Security Conference in The Netherlands has been announced and it’s packed with cutting edge research on a range of attack and …
![BSidesLjubljana](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102406/bsidesljubljana-400x200.jpg)
BSidesLjubljana 0x7E2 CFP is now open!
BSidesLjubljana 0x7E2, taking place on March 10th 2018, is looking for speakers, sponsors and everyone in between. This is an amazing community-focused event, led by a group …
![RSA Conference](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195007/rsaconference-400x200.png)
Today only: Save $1,100 on a full RSA Conference conference pass!
UPDATE: The Cyber Monday special offer is over, but you can still get the $1,000 Early Bird discount. Register today! Save an additional $100 on top of the $1,000 Early Bird …
![fight](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103648/fight-400x200.jpg)
Why end-to-end encryption is about more than just privacy
The question of whether regular people need end-to-end encryption will surely be debated for quite some time. But for Alan Duric, CEO and co-founder of Wire, the question can …
![organize](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103202/organize-400x200.jpg)
KPN CISO paints a greater security picture
Being the CISO of such a huge and diverse company as KPN, the Netherlands’ largest telecom and ISP provider, requires great determination, and the current holder of the …
![DEF CON 25](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103627/defcon-25-400x200.jpg)
Decrypting DEF CON badge challenges
Every summer, tens of thousands of hackers and information security enthusiasts make a journey to the Last Vegas strip for the Black Hat and DEF CON security conferences. …
![Business](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103916/business-man_woman-400x200.jpeg)
Security startup confessions: Attending industry events
My name is Kai Roer and I am a co-founder of European security startup CLTRe, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104053/person-400x200.jpg)
Could an independent NGO solve the problem of cyber attack attribution?
Cyber attack attribution is a necessary prerequisite for holding actors accountable for malicious cyber activity, but is notoriously difficult to achieve. Perhaps it’s …
![Wi-Fi](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104514/wifi-400x200.jpg)
Lure10: Exploiting Wi-Fi Sense to MITM wireless Windows devices
Karma has long been a staple man-in-the-middle attack used in authorised wireless security assessments and unsanctioned ones, but as many modern operating systems now provide …
![HITBSecConf](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104539/IMG_2997-400x200.jpg)
Photos: HITBSecConf Amsterdam 2017
The always exciting Hack In The Box conference took place last week in Amsterdam. Groundbreaking security research was disclosed during the event, which also featured a free …
![SMAU Padova 2017](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104622/smau-padova-2017-400x200.jpg)
Photos: SMAU Padova 2017 roadshow
Last week at Padovafiere we attended the SMAU Padova 2017 roadshow. The event featured several IT topics including cybersecurity and the Internet of Things – on the show …
![HITBSecConf](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113642/hitb-2016ams-400x200.png)
Researchers to present new software and hardware vulnerabilities at HITB Amsterdam
Users assume the underlying hardware and software system, mobile antivirus, password managers and encryption technology will protect them from malicious attacks on their …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)