HOME
ABOUT
TRAINING
CXO BRIEF
CONFERENCE
TICKETS
MERCHANDISE
POSTS
CONTACT US
More
0
All Posts
Talks
Workshops
Training
Kampung (Village)
CTF
Electronic Badge
Today I Learned
Search
Infosec In the City (IIC) — 2 Years In & the Future
Contemporary ARM Security Research Surface — by Ron Munitz
Building a Better SDLC Using Threat Modelling — by Stephen Kapp
Introduction to YARA — by Matt Brooks
Advanced WiFi Penetration Test — by Chai Kunzhe & Yang Yunfei
Hardware Hacking Live: Workshop, Q&A — by Joe FitzPatrick
The Human Nature of Cybersecurity — by Dr. Jessica Barker
What's Lurking In Your Home Network — by Christopher Lek
Picking Your Favourite Children: Security Programmes Are Not Created Equal — by Iftach Ian Amit
Catching Bad Guys with Machine Learning — by Eugene Teo
IoT: An Approach Into Analysis Smartlocks — by Lucas Kauffman
Think Like a Hacker — by Tachfine El Belky
Getting Started with Windows Security Research — by James Forshaw
Death, Taxes & IT Security — by Julian Ho
Casing the Joint — How Good Preparation Is the Key To Any Social Engineering Exercise —by Ian Maxted
Security Is An Illusion: Why Robbing Banks Is Easy — by FC
What Can We Do To Stop the Rot — by Stephen Kapp
Anatomy & Impact of Hardware Attacks — by Joe FitzPatrick
360° Introduction to Connected Car Security — by Li Jun
Let Me Pick Your Brain — by Vitaly Kamluk & Nicolas Collery
1
2