In an era increasingly dominated by artificial intelligence (AI), the fundamentals of cybersecurity remain critically important for IT professionals. As organizations integrate AI technologies into their operations, the attack surface expands, creating new vulnerabilities that can be exploited by cyber criminals. Understanding core cybersecurity principles—such as risk management, threat detection, and incident response—enables IT teams Read More …
Tag: conference talk
Conference Video – Observability in the Age of LLMs – Christine Yen
In a keynote, Christine Yen, co-founder and CEO of Honeycomb, discusses the challenges that large language models (LLMs) present to traditional software development practices like testing and debugging. She argues that the inherent unpredictability and non-deterministic nature of LLMs necessitate a shift towards observability, which focuses on understanding software behavior in production by observing what Read More …
Conference Video – A Needle in a Haystack
A Needle in a Haystack: How to Find a Threat Hidden in Over 6 Billion Logs Per Day – Brian Davis This video features Brian Davis from Red Canary discussing their approach to detecting security threats within the massive volume of cloud environment logs. He explains their six-stage pipeline: Ingest, Standardize, Combine, Detect, Suppress, and Read More …
Cloud Penetration Testing for Traditional Hackers | Nick Frichette
An introduction to cloud penetration testing on AWS, tailored for those familiar with traditional web and network penetration testing. It highlights critical areas and potential pitfalls in AWS security, using practical attack scenarios to illustrate key concepts. The discussion covers common vulnerabilities like leaky S3 buckets and misconfigured resource-based policies, emphasizing the importance of securing Read More …
Conference Video – How I Learned To Stop Worrying and Love the Blue Team
These are the videos from BSides Augusta 2016
Conference Video – Automating Malware Analysis for Threat Intelligence
These are the videos from B Sides Augusta 2016:
Conference Video – A deep look into a Chinese advanced attack
These are the videos from Derbycon 2015:
Conference Video – Why We are Not Building a Defendable Internet
In IT security, offensive problems are technical – but most defensive problems are political and organisational. Attackers have the luxury to focus only on the technical aspects of their work, while defenders have to navigate complex political and regulatory environments. In a previous talk (“Rearchitecting a defendable internet”) I discussed what technical measures would yield Read More …
Month of AI Video – Hacking AI Infrastructure Providers for Fun
An increasing number of companies are adopting AI-as-a-Service solutions to collaborate, train, and operate their artificial intelligence applications. From emerging AI startups like Hugging Face and Replicate to established cloud providers such as Microsoft Azure and SAP, thousands of customers place their trust in these services, relying on them to handle their proprietary models and Read More …