conferences
Hack In The Box announces keynote speakers for 2018 Amsterdam event
Hack In The Box Security Conference (HITBSecConf) is returning to Amsterdam in April this year with more than 70 speakers who will take to stage. This year’s marks the 9th …
HITB Security Conference in Amsterdam is all about advanced research
The agenda for Day 2 of the 9th annual HITB Security Conference in The Netherlands has been announced with even more advanced research including new sandbox evasion …
HITB Security Conference in Amsterdam to feature innovative research on attack and defense topics
The agenda for Day 1 of the 9th annual HITB Security Conference in The Netherlands has been announced and it’s packed with cutting edge research on a range of attack and …
BSidesLjubljana 0x7E2 CFP is now open!
BSidesLjubljana 0x7E2, taking place on March 10th 2018, is looking for speakers, sponsors and everyone in between. This is an amazing community-focused event, led by a group …
Today only: Save $1,100 on a full RSA Conference conference pass!
UPDATE: The Cyber Monday special offer is over, but you can still get the $1,000 Early Bird discount. Register today! Save an additional $100 on top of the $1,000 Early Bird …
Why end-to-end encryption is about more than just privacy
The question of whether regular people need end-to-end encryption will surely be debated for quite some time. But for Alan Duric, CEO and co-founder of Wire, the question can …
KPN CISO paints a greater security picture
Being the CISO of such a huge and diverse company as KPN, the Netherlands’ largest telecom and ISP provider, requires great determination, and the current holder of the …
Decrypting DEF CON badge challenges
Every summer, tens of thousands of hackers and information security enthusiasts make a journey to the Last Vegas strip for the Black Hat and DEF CON security conferences. …
Security startup confessions: Attending industry events
My name is Kai Roer and I am a co-founder of European security startup CLTRe, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …
Could an independent NGO solve the problem of cyber attack attribution?
Cyber attack attribution is a necessary prerequisite for holding actors accountable for malicious cyber activity, but is notoriously difficult to achieve. Perhaps it’s …
Lure10: Exploiting Wi-Fi Sense to MITM wireless Windows devices
Karma has long been a staple man-in-the-middle attack used in authorised wireless security assessments and unsanctioned ones, but as many modern operating systems now provide …
Photos: HITBSecConf Amsterdam 2017
The always exciting Hack In The Box conference took place last week in Amsterdam. Groundbreaking security research was disclosed during the event, which also featured a free …