/Pre-Conference Interviews/
|
Aaron Katz - Pre-Conference Interview.eng.srt
|
20.3 KB
|
Aaron Katz - Pre-Conference Interview.mp4
|
11.3 MB
|
Amirali Sanatinia - SOURCE Mesa Pre-Conference Interview.eng.srt
|
15.1 KB
|
Amirali Sanatinia - SOURCE Mesa Pre-Conference Interview.mp4
|
12.6 MB
|
Anand Srinivas - Speaker Interview - Source Boston 2019.eng.srt
|
31.6 KB
|
Anand Srinivas - Speaker Interview - Source Boston 2019.mp4
|
17.9 MB
|
Andrea Little Limbago - Speaker Interview - Source Boston 2019.mp4
|
7.5 MB
|
Anurag Dwivedy - Pre-Conference Interview.eng.srt
|
15.2 KB
|
Anurag Dwivedy - Pre-Conference Interview.mp4
|
13.9 MB
|
Bob Adams - SOURCE Pre-Conference Interview.eng.srt
|
21.0 KB
|
Bob Adams - SOURCE Pre-Conference Interview.mp4
|
13.8 MB
|
Brianne Hughes - SOURCE Pre-Conference Interviews.eng.srt
|
13.7 KB
|
Brianne Hughes - SOURCE Pre-Conference Interviews.mp4
|
11.3 MB
|
BugCrowd - Speaker Interview - Source Boston 2019.eng.srt
|
38.7 KB
|
BugCrowd - Speaker Interview - Source Boston 2019.mp4
|
19.2 MB
|
Caroline Wong - SOURCE Mesa Pre-Conference Interview.eng.srt
|
23.8 KB
|
Caroline Wong - SOURCE Mesa Pre-Conference Interview.mp4
|
22.7 MB
|
Chris Cornutt - Speaker Interview - SOURCE Austin.eng.srt
|
22.7 KB
|
Chris Cornutt - Speaker Interview - SOURCE Austin.mp4
|
11.5 MB
|
Chris Romeo - SOURCE Mesa- Phoenix Conference Speaker.mp4
|
21.3 MB
|
Chris Wysopal - We See The Future And Its Not Pretty - SOURCE Security Conference.eng.srt
|
65.1 KB
|
Chris Wysopal - We See The Future And Its Not Pretty - SOURCE Security Conference.mp4
|
53.1 MB
|
Dan Cornell - Pre-Conference Interview - SOURCE Austin.mp4
|
13.0 MB
|
Deidre Diamond - Pre- conference Interview.mp4
|
16.6 MB
|
Garett Montgomery - Pre-Conference Interview - SOURCE Austin.eng.srt
|
14.0 KB
|
Garett Montgomery - Pre-Conference Interview - SOURCE Austin.mp4
|
7.6 MB
|
Georgia Weidman - SOURCE Boston Pre-Conference Interview.eng.srt
|
17.7 KB
|
Georgia Weidman - SOURCE Boston Pre-Conference Interview.mp4
|
13.7 MB
|
Harry Sverdlove - Speaker Interview - SOURCE Austin.eng.srt
|
17.3 KB
|
Harry Sverdlove - Speaker Interview - SOURCE Austin.mp4
|
8.0 MB
|
Haydn Johnson.eng.srt
|
20.4 KB
|
Haydn Johnson.mp4
|
18.0 MB
|
Interview With Security Innovations Joe Basirico - Security Innovation.eng.srt
|
31.4 KB
|
Interview With Security Innovations Joe Basirico - Security Innovation.mp4
|
40.7 MB
|
Izar Tarandach - Speaker Interview - Source Boston 2019.eng.srt
|
15.4 KB
|
Izar Tarandach - Speaker Interview - Source Boston 2019.mp4
|
9.1 MB
|
Jason Hoenich - Pre-Conference Interview.eng.srt
|
38.5 KB
|
Jason Hoenich - Pre-Conference Interview.mp4
|
25.9 MB
|
Joe Gray - SOURCE Pre-Conference Interview.mp4
|
20.1 MB
|
Joel Scambray NCC Group - SOURCE Mesa Interview.mp4
|
11.3 MB
|
Jonathan Cran - Pwnie Express presents Practical MitM Pentesting - SOURCE Security Conference.eng.srt
|
48.9 KB
|
Jonathan Cran - Pwnie Express presents Practical MitM Pentesting - SOURCE Security Conference.mp4
|
43.5 MB
|
Josh Bressers - Pre-Conference Interview - SOURCE Austin.eng.srt
|
26.3 KB
|
Josh Bressers - Pre-Conference Interview - SOURCE Austin.mp4
|
12.1 MB
|
Justine Bone - Pre-Conference Interview.eng.srt
|
9.3 KB
|
Justine Bone - Pre-Conference Interview.mp4
|
17.5 MB
|
Katy Anton - Speaker Interview - Source Boston 2019.mp4
|
13.1 MB
|
Kevin Babcock - SOURCE Mesa Pre Conference Interview.eng.srt
|
17.5 KB
|
Kevin Babcock - SOURCE Mesa Pre Conference Interview.mp4
|
13.1 MB
|
Lester Godsey - SOURCE Mesa Interview.eng.srt
|
20.4 KB
|
Lester Godsey - SOURCE Mesa Interview.mp4
|
12.0 MB
|
Marcus Carey - Speaker Interview - SOURCE Austin.mp4
|
6.3 MB
|
Masha Sedova - SOURCE Boston Pre-Conference Interview.eng.srt
|
32.0 KB
|
Masha Sedova - SOURCE Boston Pre-Conference Interview.mp4
|
25.4 MB
|
Master Class InfoSec Train the Trainer.mp4
|
6.8 MB
|
Matthew Cheung - SOURCE Pre-Conference Interview.mp4
|
11.0 MB
|
Megan Roddie - Pre-Conference Interview - SOURCE Austin.eng.srt
|
29.3 KB
|
Megan Roddie - Pre-Conference Interview - SOURCE Austin.mp4
|
16.4 MB
|
Megan Roddie - SOURCE Mesa Pre-Conference Interview.eng.srt
|
19.1 KB
|
Megan Roddie - SOURCE Mesa Pre-Conference Interview.mp4
|
19.1 MB
|
Michael Borohovski - Speaker Interview - SOURCE Austin.mp4
|
12.2 MB
|
Mike Murray - Pre-Conference Interview - SOURCE Austin.eng.srt
|
27.1 KB
|
Mike Murray - Pre-Conference Interview - SOURCE Austin.mp4
|
13.4 MB
|
Ming Fu - Pre-Conference Interview.eng.srt
|
29.6 KB
|
Ming Fu - Pre-Conference Interview.mp4
|
26.8 MB
|
Nathan Cooprider - SOURCE Mesa Pre-Conference Interview.mp4
|
19.9 MB
|
Paul Asadoorian - SOURCE Boston Pre-Conference Interview.eng.srt
|
22.4 KB
|
Paul Asadoorian - SOURCE Boston Pre-Conference Interview.mp4
|
18.4 MB
|
Personal Message From Our Executive Director.eng.srt
|
12.1 KB
|
Personal Message From Our Executive Director.mp4
|
6.6 MB
|
Phillip Maddux - SOURCE Pre-Conference Interview.eng.srt
|
17.6 KB
|
Phillip Maddux - SOURCE Pre-Conference Interview.mp4
|
15.0 MB
|
Rafal Los - SOURCE Mesa Speaker Interview.mp4
|
31.0 MB
|
Richard Stiennon - Speaker Interview - Source Boston 2019.eng.srt
|
36.2 KB
|
Richard Stiennon - Speaker Interview - Source Boston 2019.mp4
|
33.4 MB
|
Richard Thieme - Speaker Interview - SOURCE Austin 2018.eng.srt
|
35.4 KB
|
Richard Thieme - Speaker Interview - SOURCE Austin 2018.mp4
|
20.7 MB
|
Robert Sell - SOURCE Mesa Pre-Conference Interview.mp4
|
17.4 MB
|
Rocio Baeza - SOURCE Mesa Speaker Interview.mp4
|
18.3 MB
|
Roxy Dee - SOURCE Mesa 2018 Interview.eng.srt
|
16.3 KB
|
Roxy Dee - SOURCE Mesa 2018 Interview.mp4
|
10.8 MB
|
Sandy Carielli - Pre-Conference Interview.mp4
|
11.8 MB
|
Stacy Thayer - Pre-Conference Interview - SOURCE Austin.eng.srt
|
37.9 KB
|
Stacy Thayer - Pre-Conference Interview - SOURCE Austin.mp4
|
20.3 MB
|
Swapnil Deshmukh - SOURCE Mesa 2018 Interviews.eng.srt
|
15.3 KB
|
Swapnil Deshmukh - SOURCE Mesa 2018 Interviews.mp4
|
15.7 MB
|
Thomas Fischer - SOURCE Boston Pre-Conference Interview.eng.srt
|
30.2 KB
|
Thomas Fischer - SOURCE Boston Pre-Conference Interview.mp4
|
22.0 MB
|
Valery Berestetsky, Jonathan Schaaf - Speaker Interview - SOURCE Austin.mp4
|
10.5 MB
|
Vince Warrington - Pre-Conference Interview - SOURCE Boston.eng.srt
|
13.3 KB
|
Vince Warrington - Pre-Conference Interview - SOURCE Boston.mp4
|
9.4 MB
|
Walter Williams - Pre-Conference Interview.eng.srt
|
21.4 KB
|
Walter Williams - Pre-Conference Interview.mp4
|
14.0 MB
|
/SOURCE 2008 Boston/
|
A Security Metric for Software Developer.mp4
|
40.9 MB
|
Advanced Linux Firewalls.mp4
|
57.5 MB
|
All the Data That s Fit to Visualize.mp4
|
48.4 MB
|
Automated Structural Malware Classification.mp4
|
61.5 MB
|
Banking on education - A case study on security training programs.mp4
|
65.4 MB
|
Business Logic Flaws.mp4
|
52.5 MB
|
CEO Panel.mp4
|
46.7 MB
|
Content Awareness - A Cornerstone to Data Prote.mp4
|
56.1 MB
|
Deperimetrisation - Dream Or Nightmare For Network Security.mp4
|
75.3 MB
|
Detailed Thread Modeling.mp4
|
59.8 MB
|
Developing an Incident Response Plan.mp4
|
65.1 MB
|
Disruptive Innovation and the Future of Security.mp4
|
65.0 MB
|
Entrepreneur Panel.mp4
|
63.2 MB
|
Establishing a Security Metrics Program.mp4
|
51.4 MB
|
Having a Defined Target for Software Security Testing.mp4
|
45.2 MB
|
How Compliance Can Get You Killed.mp4
|
60.4 MB
|
Information Operations.mp4
|
47.1 MB
|
Investigation Techniques for Social Networking Sites.mp4
|
61.0 MB
|
Keynote - Dan Geer.mp4
|
49.1 MB
|
Keynote - Steven Levy.mp4
|
51.0 MB
|
Keynote Speaker - Richard Clarke.mp4
|
41.4 MB
|
L0pht Panel.mp4
|
64.3 MB
|
Managing Your Career in Infosec.mp4
|
62.3 MB
|
Not Dead But Twitching - Anti-Virus Succumbs to the Scourge of Modern Malware.mp4
|
61.7 MB
|
Panel Discussion - The tug-o-war between business and security.mp4
|
53.0 MB
|
Telephone Defenses Against the Dark Arts (part1).mp4
|
118.8 MB
|
The CERT C Secure Coding Standard.mp4
|
63.9 MB
|
Understanding Emerging Threats - The case of Nugache.mp4
|
59.4 MB
|
Understanding and Preventing Data Breaches, The Real World Edition.mp4
|
40.3 MB
|
Vulnerability in the Real World - Lessons from both sides of the fence.mp4
|
62.3 MB
|
Web Application Panel.mp4
|
59.7 MB
|
Your car passed inspection but what about your software.mp4
|
49.1 MB
|
/SOURCE 2009 Boston/
|
400 Apps in 40 Days.mp4
|
57.3 MB
|
A Virtualization and Cloud Computing Security Fable Set To Interpretive Dance.mp4
|
77.4 MB
|
Anti-Debugging - A Developer s Viewpoint.mp4
|
61.6 MB
|
Attacking Layer 8 - Client Side Penetration Testing.mp4
|
48.1 MB
|
Career Management Workshop (part 1).mp4
|
85.9 MB
|
Career Management Workshop (part 2).mp4
|
100.8 MB
|
Dissecting Foreign Web Attacks.mp4
|
53.6 MB
|
Employing PCI Compliance Programs.mp4
|
57.1 MB
|
Encryption and Enterprise Data Security.mp4
|
58.5 MB
|
Exploiting Unicode-enable Software.mp4
|
52.1 MB
|
From The Garage To NASDAQ With Open Source - The Sourcefire Experience.mp4
|
66.6 MB
|
Get Rich or Die Trying - - Making Money on the Web the Black Hat Way.mp4
|
58.8 MB
|
Horseless Carriage Exploits and Eavesdropping Defenses.mp4
|
111.9 MB
|
How Microsoft Fixes Security Vulnerabilities.mp4
|
60.3 MB
|
How to Respond to an Unexpected Security Incident - A Reality Check.mp4
|
47.0 MB
|
I Can Haz Privacy.mp4
|
52.4 MB
|
Information Security in Higher Education - Baby Steps.mp4
|
57.1 MB
|
Introducing Heyoka - DNS Tunneling 2.0.mp4
|
50.7 MB
|
L0phtCrack 6 Release.mp4
|
53.7 MB
|
Marcus Ranum Keynote.mp4
|
65.1 MB
|
Massachusetts Data Breach Laws, Regulations, and Responsibilities.mp4
|
33.7 MB
|
Maximizing ROI on Vulnerability Management.mp4
|
47.2 MB
|
Panel - The Partial Disclosure Dilemma.mp4
|
101.6 MB
|
Panel Discussion - 2009 And Beyond.mp4
|
58.6 MB
|
Peter Kuper - Keynote.mp4
|
56.6 MB
|
Protecting Vulnerable Web Applications With IIS7.mp4
|
61.7 MB
|
Secure Voice Communications - The Missing Piece in Mobile Security.mp4
|
56.9 MB
|
Security Start-Up Event (showcase).mp4
|
56.8 MB
|
Security Startup Showcase.mp4
|
54.5 MB
|
So You Want To Train An Army Of Ninjas.mp4
|
51.6 MB
|
Splunk.mp4
|
56.7 MB
|
Tenable Network Security.mp4
|
55.4 MB
|
The Crisis in Information Security.mp4
|
61.2 MB
|
Turning Science into Sound Bites - Lessons from - Prototype This.mp4
|
55.4 MB
|
Wireless Sensor Networking As An Asset And A Liability.mp4
|
68.7 MB
|
/SOURCE 2010 Barcelona/
|
Anti-Virus Product Testing Sessions.mp4
|
79.4 MB
|
Applied Threat Modeling - Live.mp4
|
68.9 MB
|
Balancing the Pwn Trade Deficit.mp4
|
49.6 MB
|
Building Bridges - Forcing Hackers and Business to - Hug it Out.mp4
|
45.5 MB
|
Carders.cc, the Rise and Fall of an Underground Forum.mp4
|
59.5 MB
|
Cyber[Crime War] - Connecting the Dots.mp4
|
55.0 MB
|
ERP Security - Myths, Problems, Solutions.mp4
|
74.5 MB
|
Hacking SAP BusinessObjects.mp4
|
31.8 MB
|
If Black Hats always win, why is Albert Gonzalez in prison.mp4
|
50.0 MB
|
Implementing a CSIRT - Lessons Learnt from Setting Up the Irish CERT.mp4
|
88.3 MB
|
Jackpotting Automated Teller Machines.mp4
|
88.6 MB
|
Leveraging Social Networking While Mitigating Risk.mp4
|
40.2 MB
|
Passwords in Corporate Networks.mp4
|
65.9 MB
|
Revolution or Evolution - Information Security 2020.mp4
|
36.8 MB
|
SCCP hacking Attacking the SS7 & SIGTRAN and Mapping the Phone System.mp4
|
76.3 MB
|
Security Sucks.mp4
|
37.7 MB
|
Security in Agile PLC - Practical navigational aid for speed boats.mp4
|
44.1 MB
|
Security in the SDLC - IT Doesn t Have To Be Painful.mp4
|
78.4 MB
|
Using the the 36 stratagems for Social Engineering.mp4
|
69.9 MB
|
/Presentation Slides/
|
10-04-SOURCE-DetectingPenTesters.pptx
|
4.0 MB
|
Adobe_SOURCEBoston.pptx
|
1.6 MB
|
BillBlunden.pdf
|
2.3 MB
|
Broken Arrows Source.pdf
|
2.0 MB
|
Brueggemann.pptx
|
1.2 MB
|
DanK.pptx
|
783.5 KB
|
Dino.pdf
|
1.8 MB
|
HDKeynote.pdf
|
5.3 MB
|
Managed Code Rootkits - Erez Metula.ppt
|
2.5 MB
|
MonkeyBerries-SourceBoston-2010.pdf
|
1.6 MB
|
Moxie.pdf
|
4.5 MB
|
NSSLabs - SourceBoston.ppt
|
2.2 MB
|
NT Object (In)Security.pdf
|
613.7 KB
|
PCI-right_wrong_2010-04-22.pdf
|
1.1 MB
|
RandyBarr.pptx
|
1.8 MB
|
Robert Clark.ppt
|
322.6 KB
|
Rugged Software Development_20100311(2).pdf
|
7.9 MB
|
SOURCE Boston 2010 Clark slides.ppt
|
320.5 KB
|
SOURCE-Boston-2010.pdf
|
3.0 MB
|
SteveChristey.pptx
|
1.3 MB
|
VulnPanel.pptx
|
168.6 KB
|
Windows File Pseudonyms.pptx
|
726.7 KB
|
carmen.pdf
|
3.9 MB
|
iSEC_Securely_Moving_Into_The_Cloud.pdf
|
648.8 KB
|
sb2010-schedule.htm
|
145.8 KB
|
source10-linuxkernel-jonoberheide.pdf
|
895.7 KB
|
/Videos/
|
Adam Meyers - Reverse Engineering Broken Arrows.mp4
|
56.0 MB
|
Adam Meyers - Security Sucks.mp4
|
62.7 MB
|
Allison Miller - Protecting Customers from Online Threats.mp4
|
68.2 MB
|
Andy Purdy - Keynote.mp4
|
97.0 MB
|
Bill Blunden - An Uninvited Guest.mp4
|
85.6 MB
|
Brian Holyfield - Cracking the Foundation.mp4
|
69.6 MB
|
Carole Fennelly - Vulnerability Management Panel.mp4
|
66.0 MB
|
Chris Clark and Townsend Ladd Harris - Attacking WebOS.mp4
|
74.7 MB
|
Chris Hoff - Cloudiforniturtles.mp4
|
73.2 MB
|
Colin Ames - Neurosurgery With Meterpreter.mp4
|
46.0 MB
|
Dan Crowley - Windows File Pseudonyms.mp4
|
57.3 MB
|
David Mortman - Too Many Cooks Spoil the Broth.mp4
|
68.2 MB
|
Deviant Ollam - The Four Types of Locks.mp4
|
85.5 MB
|
Dino Dai Zovi - Practical Return-Oriented Programming.mp4
|
81.2 MB
|
Dov Yoran and Chris Hoff - Cloud Security.mp4
|
64.1 MB
|
Erez Metula - Managed Code Rootkits.mp4
|
60.9 MB
|
HD Moore - Keynote.mp4
|
73.8 MB
|
HD Moore - Making Penetration Testing Mainstream.mp4
|
88.8 MB
|
Jake Appelbaum - Anonymity, Privacy, and Cirvumvention with Tor.mp4
|
92.1 MB
|
John Cran - Realities of Starting a Security Company - Entrepreneurs Panel.mp4
|
72.1 MB
|
Jon Oberheide - Linux Kernel Exploitation.mp4
|
39.0 MB
|
Josh Corman - Realities of Starting a Security Company - Investors Panel.mp4
|
79.8 MB
|
Josh Corman - Rugged Software.mp4
|
71.1 MB
|
Lenny Zeltser - Knock Knock.mp4
|
63.3 MB
|
Mary Ann Davidson - Keynote.mp4
|
80.8 MB
|
Mike Kershaw - Wifi Security.mp4
|
62.7 MB
|
Moxie Marlinspike - Changing Threats to Privacy.mp4
|
91.1 MB
|
Paul Asadoorian - Embedded System Hacking.mp4
|
77.4 MB
|
Rafal Los and Matt Wood - Into the Rabbit Hole.mp4
|
88.9 MB
|
Randolph Barr - Gain Comfort in Losing Control to the Cloud.mp4
|
61.2 MB
|
Rich Mogull - Involuntary Case Studies in Data Breaches.mp4
|
93.9 MB
|
Riley Hassell - NT Object Insecurity.mp4
|
59.8 MB
|
Robert Clark - Legal Aspects of Computer Network Security and Privacy.mp4
|
78.6 MB
|
Ron Gula - Detecting Penetration Testing.mp4
|
65.5 MB
|
Timothy Brueggemann - Understanding The Key to Protecting Highly Sensitive PII.mp4
|
59.0 MB
|
Travis Goodspeed - Breaking Zigbee Crypto.mp4
|
63.8 MB
|
Trend Micro - Measuring Security.mp4
|
127.1 MB
|
Wendy Poland and David Lenoe - Bullseye on Your Back.mp4
|
78.7 MB
|
/SOURCE 2012 Boston/
|
Advanced SQL Injection with SQLol - The Configurable SQLi Testbed.mp4
|
45.6 MB
|
Behind The Scenes - Pwning Satellite Cable TV.mp4
|
41.9 MB
|
Celebrating Bad Crypto.mp4
|
45.2 MB
|
Criticality, Rejectionists, Risk Tolerance - Keynote at Source Boston 2012.mp4
|
47.1 MB
|
De-constructing the Cost of a Data Breach.mp4
|
37.9 MB
|
Finding the Weak Link in Windows Binaries.mp4
|
38.0 MB
|
Games We Play - Defenses and Disincentives.mp4
|
59.5 MB
|
Inside the Duqu Command and Control Servers,.mp4
|
50.3 MB
|
Lessons Of Static Binary Analysis.mp4
|
55.0 MB
|
Media Hype in the Information Security Industry.mp4
|
37.0 MB
|
Microsoft s Response Process - 10 Years of Hard Knock Learning.mp4
|
57.7 MB
|
Mobile Snitch - Devices telling the world about you.mp4
|
39.6 MB
|
No Victims - How to Measure & Communicate Risk.mp4
|
51.0 MB
|
Perspectives of How to Develop a Winning Career in Infosec.mp4
|
37.8 MB
|
Reverse Engineering Mobile Applications.mp4
|
51.7 MB
|
SCAP for Everyone - A case study in transforming configurations.mp4
|
56.5 MB
|
SOURCE Boston 2012 - Keynote - Anonymous 20 20 - The Beginning is Near.mp4
|
51.0 MB
|
SexyDefense - Maximizing the home-field advantage.mp4
|
52.3 MB
|
Successful Application Security Programs in an Uncertain Landscape.mp4
|
45.0 MB
|
Using capture-the-flag to enhance teaching and training.mp4
|
32.7 MB
|
Voight-Kampff ing The BlackBerry PlayBook.mp4
|
51.6 MB
|
Watchtowers of the Internet - Analysis of Outbound Malware Communication.mp4
|
50.8 MB
|
What Permissions Does Your Database User REALLY Need.mp4
|
43.2 MB
|
/SOURCE 2012 Seattle/
|
Dr. David Rees & Karthik Raman - Why Developers And Vulnerability Researchers Should Collaborate.eng.srt
|
89.1 KB
|
Dr. David Rees & Karthik Raman - Why Developers And Vulnerability Researchers Should Collaborate.mp4
|
47.5 MB
|
Jason Bubolz & Rachel Engel - Unified Communications Information Loss Through the Front Door.eng.srt
|
107.6 KB
|
Jason Bubolz & Rachel Engel - Unified Communications Information Loss Through the Front Door.mp4
|
56.4 MB
|
Julien Sobrier - Browser Extensions The Backdoor To Stealth Malware - SOURCE Security Conference.eng.srt
|
89.5 KB
|
Julien Sobrier - Browser Extensions The Backdoor To Stealth Malware - SOURCE Security Conference.mp4
|
51.0 MB
|
Leveraging Collective Intelligence To Combat Cyber Crime - PANEL - SOURCE Security Conference.eng.srt
|
163.0 KB
|
Leveraging Collective Intelligence To Combat Cyber Crime - PANEL - SOURCE Security Conference.mp4
|
93.0 MB
|
Ofer Shezaf - RESTful Services, The Web Security Blind Spot - SOURCE Security Conference.eng.srt
|
88.4 KB
|
Ofer Shezaf - RESTful Services, The Web Security Blind Spot - SOURCE Security Conference.mp4
|
56.5 MB
|
Robert Lee - The Interim Years Of Cyberspace Security In A Domain Of Warfare.eng.srt
|
99.5 KB
|
Robert Lee - The Interim Years Of Cyberspace Security In A Domain Of Warfare.mp4
|
45.6 MB
|
Rodrigo Montoro - Scoring PDF Structure To Detect Malicious Files - SOURCE Security Conference.eng.srt
|
59.9 KB
|
Rodrigo Montoro - Scoring PDF Structure To Detect Malicious Files - SOURCE Security Conference.mp4
|
38.9 MB
|
Steve Werby & Randy Todd - Building Dictionaries And Destroying Hashes Using Amazon EC2.eng.srt
|
103.8 KB
|
Steve Werby & Randy Todd - Building Dictionaries And Destroying Hashes Using Amazon EC2.mp4
|
52.1 MB
|
Tony Rucci - Just Another Day at the Office September 11, 2001, The White House.eng.srt
|
87.6 KB
|
Tony Rucci - Just Another Day at the Office September 11, 2001, The White House.mp4
|
48.0 MB
|
William Cook and McGuire- Woods Data Breach - Let The Finger Pointing Begin.eng.srt
|
85.7 KB
|
William Cook and McGuire- Woods Data Breach - Let The Finger Pointing Begin.mp4
|
53.4 MB
|
Zach Lanier - Mapping And Evolution Of Android Permissions - SOURCE Security Conference.eng.srt
|
90.0 KB
|
Zach Lanier - Mapping And Evolution Of Android Permissions - SOURCE Security Conference.mp4
|
50.9 MB
|
/SOURCE 2013 Boston/
|
A Brief History of Physical Security.mp4
|
41.7 MB
|
Achievement Unlocked - Designing a compelling security awareness program.mp4
|
44.1 MB
|
Adversarial Resilience at the Planetary Scale.mp4
|
46.6 MB
|
Analysis of The BroBot DDOS Attack.mp4
|
53.2 MB
|
Analyzing the Chemistry of Data.mp4
|
48.4 MB
|
Android Modding for the Security Practitioner.mp4
|
44.6 MB
|
Attacking Cloud Services with Source Code (2).mp4
|
48.2 MB
|
Attacking Cloud Services with Source Code.mp4
|
48.6 MB
|
Avoiding Android App Security Pitfalls.mp4
|
45.9 MB
|
BYOD - The Risks, Rewards and Challenges.mp4
|
38.5 MB
|
Big Data Big Liability.mp4
|
42.7 MB
|
Birds, bots and machines - Fraud in Twitter and how to detect it using Machine Learning Techniques.mp4
|
50.2 MB
|
Blitzing with your Defense.mp4
|
55.0 MB
|
Bring Your Own Device - Keeping it Simple and Effective.mp4
|
54.6 MB
|
Browser Extensions - The Backdoor To Stealth Malware.mp4
|
56.7 MB
|
Building Dictionaries And Destroying Hashes Using Amazon EC2.mp4
|
55.8 MB
|
Building Your Own Packet Capture Platform.mp4
|
62.7 MB
|
ColdFusion for Penetration Testers.mp4
|
37.4 MB
|
Covering your - aaS - Cloud Security Case Studies for SaaS, PaaS, and IaaS.mp4
|
41.6 MB
|
Data Breach - Let The Finger Pointing Begin.mp4
|
60.7 MB
|
Distributed Security - Expanding the Toolkit for Institutional Resilience.mp4
|
56.8 MB
|
Facilitating Fluffy Forensics (a.k.a. Considerations for Cloud Forensics).mp4
|
56.7 MB
|
Games We Play - Payoffs & Chaos Monkeys.mp4
|
39.4 MB
|
Hacking Back - is a Bad Idea.mp4
|
35.6 MB
|
Hiring Recruitment.mp4
|
89.4 MB
|
Inside the Black Hole Exploit Kit (BHEK).mp4
|
53.9 MB
|
Insider Threat - Hunting for Authorized Evil.mp4
|
54.3 MB
|
JavaScript Pitfalls.mp4
|
57.4 MB
|
Just Another Day at the Office... September 11, 2001, The White House.mp4
|
41.7 MB
|
Keynote - Andy Ellis.mp4
|
66.3 MB
|
Keynote - Dan Geer & Richard Thieme.mp4
|
57.5 MB
|
Keynote - Gene Kim.mp4
|
37.5 MB
|
Lessons Of Binary Analysis.mp4
|
113.4 MB
|
Lessons of the Kobayashi Maru - If You re Not Cheating, You re Not Trying.mp4
|
40.4 MB
|
Leveraging Collective Intelligence To Combat Cyber Crime.mp4
|
85.4 MB
|
Mapping And Evolution Of Android Permissions.mp4
|
44.3 MB
|
PLC SCADA Vulnerabilities in Correctional Facilities.mp4
|
55.8 MB
|
Practical Exploitation of Embedded Systems.mp4
|
52.2 MB
|
Privacy at the Border - A Guide for Traveling with Devices.mp4
|
56.8 MB
|
Proactive Defense.mp4
|
46.4 MB
|
Protecting sensitive information on iOS devices.mp4
|
53.5 MB
|
Pwnie Express presents Practical MitM Pentesting.mp4
|
46.7 MB
|
RESTful Services, The Web Security Blind Spot.mp4
|
51.1 MB
|
Rise In ATM Compromises.mp4
|
47.1 MB
|
Scoring PDF Structure To Detect Malicious Files.mp4
|
35.2 MB
|
Strategic Analysis of the iOS Jailbreak Development Community.mp4
|
44.3 MB
|
Suicide Risk Assessment and Intervention Tactics.mp4
|
56.1 MB
|
The Base Rate Fallacy - Information Security Needs To Understand This..mp4
|
52.5 MB
|
The Interim Years Of Cyberspace - Security In A Domain Of Warfare.mp4
|
48.1 MB
|
Theory and Application of Realistic Capture the Flag Competitions.mp4
|
48.1 MB
|
Unified Communications - Information Loss Through the Front Door.mp4
|
61.3 MB
|
Vulnerabilities of Control Systems in Drinking Water Utilities.mp4
|
52.8 MB
|
We See The Future And It s Not Pretty.mp4
|
55.8 MB
|
Why Developers And Vulnerability Researchers Should Collaborate.mp4
|
32.7 MB
|
Your PCI Assessor - Best Friend or Worst Enemy You Choose....mp4
|
54.7 MB
|
/SOURCE 2015 Boston/
|
All That Cybers Is Not War - SOURCE Security Conference Boston 2015.eng.srt
|
150.2 KB
|
All That Cybers Is Not War - SOURCE Security Conference Boston 2015.mp4
|
131.9 MB
|
Andy Ellis - Cognitive Injection - SOURCE Security Conference Boston 2015.eng.srt
|
77.8 KB
|
Andy Ellis - Cognitive Injection - SOURCE Security Conference Boston 2015.mp4
|
61.6 MB
|
Aqua Vitae The Water of Life - Martin McKeay - SOURCE Dublin 2015.mp4
|
62.6 MB
|
Bob Rudis - Before and Beyond the Breach New Research in the 2015 DBIR.eng.srt
|
121.1 KB
|
Bob Rudis - Before and Beyond the Breach New Research in the 2015 DBIR.mp4
|
53.5 MB
|
Bugged Files Is Your Document Telling on You - Daniel Crowley and Damon Smith.eng.srt
|
75.5 KB
|
Bugged Files Is Your Document Telling on You - Daniel Crowley and Damon Smith.mp4
|
46.7 MB
|
Catherine Pearce - Multipath TCP Breaking Today’s Networks with Tomorrow’s Protocols.eng.srt
|
57.8 KB
|
Catherine Pearce - Multipath TCP Breaking Today’s Networks with Tomorrow’s Protocols.mp4
|
61.7 MB
|
Chasing Uniqueness, Understanding Normal - Neil King - SOURCE Dublin 2015.mp4
|
66.0 MB
|
Dakota Nelson - Monitoring Social Media in 5 Minutes a Week - SOURCE Security Conference.eng.srt
|
52.2 KB
|
Dakota Nelson - Monitoring Social Media in 5 Minutes a Week - SOURCE Security Conference.mp4
|
34.4 MB
|
Dan Lambright - Penetration Testing in the Cloud - SOURCE Security Conference.eng.srt
|
48.8 KB
|
Dan Lambright - Penetration Testing in the Cloud - SOURCE Security Conference.mp4
|
37.9 MB
|
Doug Wilson and Thomas Millar - Cyber Information Sharing a Means not an End.eng.srt
|
86.9 KB
|
Doug Wilson and Thomas Millar - Cyber Information Sharing a Means not an End.mp4
|
59.3 MB
|
From Tech to Exec - Panel - SOURCE Security Conference Boston 2015.eng.srt
|
77.6 KB
|
From Tech to Exec - Panel - SOURCE Security Conference Boston 2015.mp4
|
61.7 MB
|
Growing Up A Maturity Model and Roadmap for Vulnerability Management.eng.srt
|
54.8 KB
|
Growing Up A Maturity Model and Roadmap for Vulnerability Management.mp4
|
51.4 MB
|
Guillaume Ross - iOS App Analytics VS Privacy An analysis of the use of analytics.eng.srt
|
66.7 KB
|
Guillaume Ross - iOS App Analytics VS Privacy An analysis of the use of analytics.mp4
|
35.2 MB
|
Jared Carlson - A Swift Teardown - SOURCE Security Conference Boston 2015.mp4
|
32.2 MB
|
Jason Syversen - Quantifying cyber attacks to optimize and assess your defense.eng.srt
|
64.4 KB
|
Jason Syversen - Quantifying cyber attacks to optimize and assess your defense.mp4
|
52.4 MB
|
Jen Ellis - Hacking the Media for Fame and Profit - SOURCE Security Conference Boston 2015.eng.srt
|
138.4 KB
|
Jen Ellis - Hacking the Media for Fame and Profit - SOURCE Security Conference Boston 2015.mp4
|
79.5 MB
|
Jeremiah O’Connor - Using NLP to detect phishing and APT CnC domains.eng.srt
|
54.8 KB
|
Jeremiah O’Connor - Using NLP to detect phishing and APT CnC domains.mp4
|
47.5 MB
|
Jim Routh - KEYNOTE - SOURCE Security Conference Boston 2015.eng.srt
|
87.9 KB
|
Jim Routh - KEYNOTE - SOURCE Security Conference Boston 2015.mp4
|
82.4 MB
|
Josh Pyorre - Protecting your cloud server with a cloud IDS - SOURCE Security Conference.eng.srt
|
64.3 KB
|
Josh Pyorre - Protecting your cloud server with a cloud IDS - SOURCE Security Conference.mp4
|
58.6 MB
|
Maddi Wallach - Excavating for Empathy - SOURCE Security Conference Boston 2015.eng.srt
|
57.8 KB
|
Maddi Wallach - Excavating for Empathy - SOURCE Security Conference Boston 2015.mp4
|
91.0 MB
|
Mark Ostrowski and Steven Baker - Evolution of Threat - SOURCE Security Conference.eng.srt
|
73.9 KB
|
Mark Ostrowski and Steven Baker - Evolution of Threat - SOURCE Security Conference.mp4
|
46.9 MB
|
Matt Wood - Reactive JS Security Testing - Exploitation - SOURCE Security Conference.mp4
|
60.3 MB
|
Michael Roytman - Who Watches the Watchers Metrics for Security Strategy.eng.srt
|
95.9 KB
|
Michael Roytman - Who Watches the Watchers Metrics for Security Strategy.mp4
|
52.4 MB
|
Mike Murray - KEYNOTE - SOURCE Security Conference Boston 2015.eng.srt
|
87.4 KB
|
Mike Murray - KEYNOTE - SOURCE Security Conference Boston 2015.mp4
|
55.9 MB
|
Paul Asadoorian - Embedded Insecurity Can We Fix The Internet of Evil Things.eng.srt
|
74.2 KB
|
Paul Asadoorian - Embedded Insecurity Can We Fix The Internet of Evil Things.mp4
|
58.3 MB
|
Roy Wattanasin - Improving the State of Healthcare Information Security as a Security Investigator.eng.srt
|
69.1 KB
|
Roy Wattanasin - Improving the State of Healthcare Information Security as a Security Investigator.mp4
|
46.9 MB
|
Salvador Grec - Defending the Enterprise with Evernote - SOURCE Security Conference Boston 2015.eng.srt
|
60.1 KB
|
Salvador Grec - Defending the Enterprise with Evernote - SOURCE Security Conference Boston 2015.mp4
|
42.0 MB
|
Silas Cutler - Adversary Profile Gothic Panda - SOURCE Security Conference.eng.srt
|
53.2 KB
|
Silas Cutler - Adversary Profile Gothic Panda - SOURCE Security Conference.mp4
|
35.2 MB
|
Stephanie Losi - Selling for Security Professionals - SOURCE Security Conference Boston 2015.eng.srt
|
67.1 KB
|
Stephanie Losi - Selling for Security Professionals - SOURCE Security Conference Boston 2015.mp4
|
46.7 MB
|
Suzanne Schwartz - KEYNOTE - SOURCE Security Conference Boston 2015.eng.srt
|
84.9 KB
|
Suzanne Schwartz - KEYNOTE - SOURCE Security Conference Boston 2015.mp4
|
76.3 MB
|
Wade Woolwine and Josh Feinblum - Getting the most from your managed security providers.eng.srt
|
82.7 KB
|
Wade Woolwine and Josh Feinblum - Getting the most from your managed security providers.mp4
|
48.4 MB
|
Xiaoning Li - iROP Interesting ROP gadgets - SOURCE Security Conference.eng.srt
|
56.2 KB
|
Xiaoning Li - iROP Interesting ROP gadgets - SOURCE Security Conference.mp4
|
32.4 MB
|
/SOURCE 2015 Dublin/
|
It isn’t all foggy in the Cloud Digital Forensic Investigations in the Cloud Environment.mp4
|
55.3 MB
|
No one is coming. We are the Cavalry - Claus Haumann - SOURCE Dublin 2015.mp4
|
92.5 MB
|
Supplier Security Risk Assessment A Practical Guide - Marian Ventuneac.mp4
|
57.0 MB
|
/
|
SOURCE thank you.txt
|
0.8 KB
|
Source logo.jpg
|
24.8 KB
|
Total files 408
|