View allAll Photos Tagged Infosec
"Encryption" is one of the hottest topics trending on the internet today. However, many people still are not fully aware about the many benefits offered by encryption. This is why, for your benefit, here's an infographic to explain the history and technicalities of "Encryption"
Reference: www.purevpn.com/blog/history-of-encryption-infographic/
I've been to Kiwicon since 2010 and a volunteer since 2011. No other conference will have such crazy lanyards. Kiwicon was unique in every single aspect.
George the Penguin, the Akamai Technologies InfoSec team mascot, joined Akamai's 6th Annual Akamai Edge Conference in Washington, DC. George's mission is to help educate on the benefits of security and reward those that perform outstanding acts of security. He is frequently found exploring his surroundings and popping up in the least expected places.
Learn more about Akamai Security Solutions: www.akamai.com/security
Learn more about George's story: www.securitypenguin.com/
Blog post : www.foo.be/cgi-bin/wiki.pl/2009-07-31-The_Yin_and_Yang_Of...
Visualizing the Yin and Yang of Information Security. Working in the information security field, I had some difficulties to explain the equilibrium I tried to reach. Stuck (again) in a traffic jam, I quickly drew the following three circles representing the three kind of "information security" approach. I somehow work in the three circles and often trying to reconcile the three with some failures but also some success.
Being in the centre is very hard, you have to balance between proper implementation (the creation part), proper implementation against "deconstruction"/attacks while keeping an eye on the scientific input.
In the chapter 46 of the "Myths of Security", John Viega is nicely explaining when you are just in the academic hacking circle without going close to the two other circles. You are doing academic novelty that no one can use, implement and attack. So the impact of your academic research is only the academic circle and nothing else.
When Linus Torvalds is stating "we should not glorify security monkey", this is the classical behaviour of staying in the "de constructing" circle without trying to find something creative and/or academic to solve the security issue.
When Wietse Venema is explaining that you should write small independent without modifying existing program to not affect the integrity of the others program, it's when you are creating a new software without taking into account the "de constructing" attacks on your software or the scientific background to make your software with a good level of formal correctness.
I'm the first to make the mistake to be contained in a single circle but you must force yourself to touch the two other circles in some ways. Information security is difficult but this equilibrium (academic, creativity and deconstruction) is difficult to reach. When you are close to reach to it, this is really a great moment...
"There's a compounding and unraveling chaos that is perpetually in motion in the Dark Web's toxic underbelly."-James Scott, Senior Fellow, ICIT, CCIOS and CSWS
#ThursdayThoughts #cybersecurity #cybercrime #infosec #databreach #security #privacy #anonymity #bitcoin #Anonymous #blockchain
Sketchnotes from a presentation given by Dr Geraint Price at Royal Holloway University of London (Information Security Group) on 28 February 2013 entitled "In Cyber Space No One Can Hear You Scream"
©ALL RIGHTS RESERVED.
These photographs are presented here for viewing purposes ONLY. They are NOT royalty free images and may not be used for commercial or private use. Any such use of these images is strictly prohibited. Specifically, these images may not be copied, manipulated, be reproduced by any other means nor sold without prior written consent by the author.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.
Why #corporates prefer #private #investigator to #cyber cops - #cybersecurity #infosec #technology… t.co/UeXuHazJy7 (via Twitter twitter.com/DataCorpLTD/status/922402488690413569)
Kawaiicon 2 took place in Te Whanganui-a-Tara Wellington, Aotearoa New Zealand, on 1 and 2 July 2022. It's the country's biggest infosec / hacker conference.
Photo by Kristina Hoeppner, Creative Commons BY-SA 4.0
Source: VZ DBIR
RSA Conference
Moscone Center - San Francisco
February 26, 2013
For videos, articles, and more photos from Security B-Sides San Francisco and the RSA Conference, check out the State of Security blog:
purplecon 2019 was the second purplecon held in Wellington, New Zealand. It's an information security conference started by a group of 4 friends who wanted to change the way infosec conferences typically are.