FileMood

Download SOURCE

SOURCE

Name

SOURCE

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

15.5 GB

Total Files

408

Hash

1A05C7452C4BFDB1ABC797144F48A0B48F1F468F

/Pre-Conference Interviews/

Aaron Katz - Pre-Conference Interview.eng.srt

20.3 KB

Aaron Katz - Pre-Conference Interview.mp4

11.3 MB

Amirali Sanatinia - SOURCE Mesa Pre-Conference Interview.eng.srt

15.1 KB

Amirali Sanatinia - SOURCE Mesa Pre-Conference Interview.mp4

12.6 MB

Anand Srinivas - Speaker Interview - Source Boston 2019.eng.srt

31.6 KB

Anand Srinivas - Speaker Interview - Source Boston 2019.mp4

17.9 MB

Andrea Little Limbago - Speaker Interview - Source Boston 2019.mp4

7.5 MB

Anurag Dwivedy - Pre-Conference Interview.eng.srt

15.2 KB

Anurag Dwivedy - Pre-Conference Interview.mp4

13.9 MB

Bob Adams - SOURCE Pre-Conference Interview.eng.srt

21.0 KB

Bob Adams - SOURCE Pre-Conference Interview.mp4

13.8 MB

Brianne Hughes - SOURCE Pre-Conference Interviews.eng.srt

13.7 KB

Brianne Hughes - SOURCE Pre-Conference Interviews.mp4

11.3 MB

BugCrowd - Speaker Interview - Source Boston 2019.eng.srt

38.7 KB

BugCrowd - Speaker Interview - Source Boston 2019.mp4

19.2 MB

Caroline Wong - SOURCE Mesa Pre-Conference Interview.eng.srt

23.8 KB

Caroline Wong - SOURCE Mesa Pre-Conference Interview.mp4

22.7 MB

Chris Cornutt - Speaker Interview - SOURCE Austin.eng.srt

22.7 KB

Chris Cornutt - Speaker Interview - SOURCE Austin.mp4

11.5 MB

Chris Romeo - SOURCE Mesa- Phoenix Conference Speaker.mp4

21.3 MB

Chris Wysopal - We See The Future And Its Not Pretty - SOURCE Security Conference.eng.srt

65.1 KB

Chris Wysopal - We See The Future And Its Not Pretty - SOURCE Security Conference.mp4

53.1 MB

Dan Cornell - Pre-Conference Interview - SOURCE Austin.mp4

13.0 MB

Deidre Diamond - Pre- conference Interview.mp4

16.6 MB

Garett Montgomery - Pre-Conference Interview - SOURCE Austin.eng.srt

14.0 KB

Garett Montgomery - Pre-Conference Interview - SOURCE Austin.mp4

7.6 MB

Georgia Weidman - SOURCE Boston Pre-Conference Interview.eng.srt

17.7 KB

Georgia Weidman - SOURCE Boston Pre-Conference Interview.mp4

13.7 MB

Harry Sverdlove - Speaker Interview - SOURCE Austin.eng.srt

17.3 KB

Harry Sverdlove - Speaker Interview - SOURCE Austin.mp4

8.0 MB

Haydn Johnson.eng.srt

20.4 KB

Haydn Johnson.mp4

18.0 MB

Interview With Security Innovations Joe Basirico - Security Innovation.eng.srt

31.4 KB

Interview With Security Innovations Joe Basirico - Security Innovation.mp4

40.7 MB

Izar Tarandach - Speaker Interview - Source Boston 2019.eng.srt

15.4 KB

Izar Tarandach - Speaker Interview - Source Boston 2019.mp4

9.1 MB

Jason Hoenich - Pre-Conference Interview.eng.srt

38.5 KB

Jason Hoenich - Pre-Conference Interview.mp4

25.9 MB

Joe Gray - SOURCE Pre-Conference Interview.mp4

20.1 MB

Joel Scambray NCC Group - SOURCE Mesa Interview.mp4

11.3 MB

Jonathan Cran - Pwnie Express presents Practical MitM Pentesting - SOURCE Security Conference.eng.srt

48.9 KB

Jonathan Cran - Pwnie Express presents Practical MitM Pentesting - SOURCE Security Conference.mp4

43.5 MB

Josh Bressers - Pre-Conference Interview - SOURCE Austin.eng.srt

26.3 KB

Josh Bressers - Pre-Conference Interview - SOURCE Austin.mp4

12.1 MB

Justine Bone - Pre-Conference Interview.eng.srt

9.3 KB

Justine Bone - Pre-Conference Interview.mp4

17.5 MB

Katy Anton - Speaker Interview - Source Boston 2019.mp4

13.1 MB

Kevin Babcock - SOURCE Mesa Pre Conference Interview.eng.srt

17.5 KB

Kevin Babcock - SOURCE Mesa Pre Conference Interview.mp4

13.1 MB

Lester Godsey - SOURCE Mesa Interview.eng.srt

20.4 KB

Lester Godsey - SOURCE Mesa Interview.mp4

12.0 MB

Marcus Carey - Speaker Interview - SOURCE Austin.mp4

6.3 MB

Masha Sedova - SOURCE Boston Pre-Conference Interview.eng.srt

32.0 KB

Masha Sedova - SOURCE Boston Pre-Conference Interview.mp4

25.4 MB

Master Class InfoSec Train the Trainer.mp4

6.8 MB

Matthew Cheung - SOURCE Pre-Conference Interview.mp4

11.0 MB

Megan Roddie - Pre-Conference Interview - SOURCE Austin.eng.srt

29.3 KB

Megan Roddie - Pre-Conference Interview - SOURCE Austin.mp4

16.4 MB

Megan Roddie - SOURCE Mesa Pre-Conference Interview.eng.srt

19.1 KB

Megan Roddie - SOURCE Mesa Pre-Conference Interview.mp4

19.1 MB

Michael Borohovski - Speaker Interview - SOURCE Austin.mp4

12.2 MB

Mike Murray - Pre-Conference Interview - SOURCE Austin.eng.srt

27.1 KB

Mike Murray - Pre-Conference Interview - SOURCE Austin.mp4

13.4 MB

Ming Fu - Pre-Conference Interview.eng.srt

29.6 KB

Ming Fu - Pre-Conference Interview.mp4

26.8 MB

Nathan Cooprider - SOURCE Mesa Pre-Conference Interview.mp4

19.9 MB

Paul Asadoorian - SOURCE Boston Pre-Conference Interview.eng.srt

22.4 KB

Paul Asadoorian - SOURCE Boston Pre-Conference Interview.mp4

18.4 MB

Personal Message From Our Executive Director.eng.srt

12.1 KB

Personal Message From Our Executive Director.mp4

6.6 MB

Phillip Maddux - SOURCE Pre-Conference Interview.eng.srt

17.6 KB

Phillip Maddux - SOURCE Pre-Conference Interview.mp4

15.0 MB

Rafal Los - SOURCE Mesa Speaker Interview.mp4

31.0 MB

Richard Stiennon - Speaker Interview - Source Boston 2019.eng.srt

36.2 KB

Richard Stiennon - Speaker Interview - Source Boston 2019.mp4

33.4 MB

Richard Thieme - Speaker Interview - SOURCE Austin 2018.eng.srt

35.4 KB

Richard Thieme - Speaker Interview - SOURCE Austin 2018.mp4

20.7 MB

Robert Sell - SOURCE Mesa Pre-Conference Interview.mp4

17.4 MB

Rocio Baeza - SOURCE Mesa Speaker Interview.mp4

18.3 MB

Roxy Dee - SOURCE Mesa 2018 Interview.eng.srt

16.3 KB

Roxy Dee - SOURCE Mesa 2018 Interview.mp4

10.8 MB

Sandy Carielli - Pre-Conference Interview.mp4

11.8 MB

Stacy Thayer - Pre-Conference Interview - SOURCE Austin.eng.srt

37.9 KB

Stacy Thayer - Pre-Conference Interview - SOURCE Austin.mp4

20.3 MB

Swapnil Deshmukh - SOURCE Mesa 2018 Interviews.eng.srt

15.3 KB

Swapnil Deshmukh - SOURCE Mesa 2018 Interviews.mp4

15.7 MB

Thomas Fischer - SOURCE Boston Pre-Conference Interview.eng.srt

30.2 KB

Thomas Fischer - SOURCE Boston Pre-Conference Interview.mp4

22.0 MB

Valery Berestetsky, Jonathan Schaaf - Speaker Interview - SOURCE Austin.mp4

10.5 MB

Vince Warrington - Pre-Conference Interview - SOURCE Boston.eng.srt

13.3 KB

Vince Warrington - Pre-Conference Interview - SOURCE Boston.mp4

9.4 MB

Walter Williams - Pre-Conference Interview.eng.srt

21.4 KB

Walter Williams - Pre-Conference Interview.mp4

14.0 MB

/SOURCE 2008 Boston/

A Security Metric for Software Developer.mp4

40.9 MB

Advanced Linux Firewalls.mp4

57.5 MB

All the Data That s Fit to Visualize.mp4

48.4 MB

Automated Structural Malware Classification.mp4

61.5 MB

Banking on education - A case study on security training programs.mp4

65.4 MB

Business Logic Flaws.mp4

52.5 MB

CEO Panel.mp4

46.7 MB

Content Awareness - A Cornerstone to Data Prote.mp4

56.1 MB

Deperimetrisation - Dream Or Nightmare For Network Security.mp4

75.3 MB

Detailed Thread Modeling.mp4

59.8 MB

Developing an Incident Response Plan.mp4

65.1 MB

Disruptive Innovation and the Future of Security.mp4

65.0 MB

Entrepreneur Panel.mp4

63.2 MB

Establishing a Security Metrics Program.mp4

51.4 MB

Having a Defined Target for Software Security Testing.mp4

45.2 MB

How Compliance Can Get You Killed.mp4

60.4 MB

Information Operations.mp4

47.1 MB

Investigation Techniques for Social Networking Sites.mp4

61.0 MB

Keynote - Dan Geer.mp4

49.1 MB

Keynote - Steven Levy.mp4

51.0 MB

Keynote Speaker - Richard Clarke.mp4

41.4 MB

L0pht Panel.mp4

64.3 MB

Managing Your Career in Infosec.mp4

62.3 MB

Not Dead But Twitching - Anti-Virus Succumbs to the Scourge of Modern Malware.mp4

61.7 MB

Panel Discussion - The tug-o-war between business and security.mp4

53.0 MB

Telephone Defenses Against the Dark Arts (part1).mp4

118.8 MB

The CERT C Secure Coding Standard.mp4

63.9 MB

Understanding Emerging Threats - The case of Nugache.mp4

59.4 MB

Understanding and Preventing Data Breaches, The Real World Edition.mp4

40.3 MB

Vulnerability in the Real World - Lessons from both sides of the fence.mp4

62.3 MB

Web Application Panel.mp4

59.7 MB

Your car passed inspection but what about your software.mp4

49.1 MB

/SOURCE 2009 Boston/

400 Apps in 40 Days.mp4

57.3 MB

A Virtualization and Cloud Computing Security Fable Set To Interpretive Dance.mp4

77.4 MB

Anti-Debugging - A Developer s Viewpoint.mp4

61.6 MB

Attacking Layer 8 - Client Side Penetration Testing.mp4

48.1 MB

Career Management Workshop (part 1).mp4

85.9 MB

Career Management Workshop (part 2).mp4

100.8 MB

Dissecting Foreign Web Attacks.mp4

53.6 MB

Employing PCI Compliance Programs.mp4

57.1 MB

Encryption and Enterprise Data Security.mp4

58.5 MB

Exploiting Unicode-enable Software.mp4

52.1 MB

From The Garage To NASDAQ With Open Source - The Sourcefire Experience.mp4

66.6 MB

Get Rich or Die Trying - - Making Money on the Web the Black Hat Way.mp4

58.8 MB

Horseless Carriage Exploits and Eavesdropping Defenses.mp4

111.9 MB

How Microsoft Fixes Security Vulnerabilities.mp4

60.3 MB

How to Respond to an Unexpected Security Incident - A Reality Check.mp4

47.0 MB

I Can Haz Privacy.mp4

52.4 MB

Information Security in Higher Education - Baby Steps.mp4

57.1 MB

Introducing Heyoka - DNS Tunneling 2.0.mp4

50.7 MB

L0phtCrack 6 Release.mp4

53.7 MB

Marcus Ranum Keynote.mp4

65.1 MB

Massachusetts Data Breach Laws, Regulations, and Responsibilities.mp4

33.7 MB

Maximizing ROI on Vulnerability Management.mp4

47.2 MB

Panel - The Partial Disclosure Dilemma.mp4

101.6 MB

Panel Discussion - 2009 And Beyond.mp4

58.6 MB

Peter Kuper - Keynote.mp4

56.6 MB

Protecting Vulnerable Web Applications With IIS7.mp4

61.7 MB

Secure Voice Communications - The Missing Piece in Mobile Security.mp4

56.9 MB

Security Start-Up Event (showcase).mp4

56.8 MB

Security Startup Showcase.mp4

54.5 MB

So You Want To Train An Army Of Ninjas.mp4

51.6 MB

Splunk.mp4

56.7 MB

Tenable Network Security.mp4

55.4 MB

The Crisis in Information Security.mp4

61.2 MB

Turning Science into Sound Bites - Lessons from - Prototype This.mp4

55.4 MB

Wireless Sensor Networking As An Asset And A Liability.mp4

68.7 MB

/SOURCE 2010 Barcelona/

Anti-Virus Product Testing Sessions.mp4

79.4 MB

Applied Threat Modeling - Live.mp4

68.9 MB

Balancing the Pwn Trade Deficit.mp4

49.6 MB

Building Bridges - Forcing Hackers and Business to - Hug it Out.mp4

45.5 MB

Carders.cc, the Rise and Fall of an Underground Forum.mp4

59.5 MB

Cyber[Crime War] - Connecting the Dots.mp4

55.0 MB

ERP Security - Myths, Problems, Solutions.mp4

74.5 MB

Hacking SAP BusinessObjects.mp4

31.8 MB

If Black Hats always win, why is Albert Gonzalez in prison.mp4

50.0 MB

Implementing a CSIRT - Lessons Learnt from Setting Up the Irish CERT.mp4

88.3 MB

Jackpotting Automated Teller Machines.mp4

88.6 MB

Leveraging Social Networking While Mitigating Risk.mp4

40.2 MB

Passwords in Corporate Networks.mp4

65.9 MB

Revolution or Evolution - Information Security 2020.mp4

36.8 MB

SCCP hacking Attacking the SS7 & SIGTRAN and Mapping the Phone System.mp4

76.3 MB

Security Sucks.mp4

37.7 MB

Security in Agile PLC - Practical navigational aid for speed boats.mp4

44.1 MB

Security in the SDLC - IT Doesn t Have To Be Painful.mp4

78.4 MB

Using the the 36 stratagems for Social Engineering.mp4

69.9 MB

/Presentation Slides/

10-04-SOURCE-DetectingPenTesters.pptx

4.0 MB

Adobe_SOURCEBoston.pptx

1.6 MB

BillBlunden.pdf

2.3 MB

Broken Arrows Source.pdf

2.0 MB

Brueggemann.pptx

1.2 MB

DanK.pptx

783.5 KB

Dino.pdf

1.8 MB

HDKeynote.pdf

5.3 MB

Managed Code Rootkits - Erez Metula.ppt

2.5 MB

MonkeyBerries-SourceBoston-2010.pdf

1.6 MB

Moxie.pdf

4.5 MB

NSSLabs - SourceBoston.ppt

2.2 MB

NT Object (In)Security.pdf

613.7 KB

PCI-right_wrong_2010-04-22.pdf

1.1 MB

RandyBarr.pptx

1.8 MB

Robert Clark.ppt

322.6 KB

Rugged Software Development_20100311(2).pdf

7.9 MB

SOURCE Boston 2010 Clark slides.ppt

320.5 KB

SOURCE-Boston-2010.pdf

3.0 MB

SteveChristey.pptx

1.3 MB

VulnPanel.pptx

168.6 KB

Windows File Pseudonyms.pptx

726.7 KB

carmen.pdf

3.9 MB

iSEC_Securely_Moving_Into_The_Cloud.pdf

648.8 KB

sb2010-schedule.htm

145.8 KB

source10-linuxkernel-jonoberheide.pdf

895.7 KB

/Videos/

Adam Meyers - Reverse Engineering Broken Arrows.mp4

56.0 MB

Adam Meyers - Security Sucks.mp4

62.7 MB

Allison Miller - Protecting Customers from Online Threats.mp4

68.2 MB

Andy Purdy - Keynote.mp4

97.0 MB

Bill Blunden - An Uninvited Guest.mp4

85.6 MB

Brian Holyfield - Cracking the Foundation.mp4

69.6 MB

Carole Fennelly - Vulnerability Management Panel.mp4

66.0 MB

Chris Clark and Townsend Ladd Harris - Attacking WebOS.mp4

74.7 MB

Chris Hoff - Cloudiforniturtles.mp4

73.2 MB

Colin Ames - Neurosurgery With Meterpreter.mp4

46.0 MB

Dan Crowley - Windows File Pseudonyms.mp4

57.3 MB

David Mortman - Too Many Cooks Spoil the Broth.mp4

68.2 MB

Deviant Ollam - The Four Types of Locks.mp4

85.5 MB

Dino Dai Zovi - Practical Return-Oriented Programming.mp4

81.2 MB

Dov Yoran and Chris Hoff - Cloud Security.mp4

64.1 MB

Erez Metula - Managed Code Rootkits.mp4

60.9 MB

HD Moore - Keynote.mp4

73.8 MB

HD Moore - Making Penetration Testing Mainstream.mp4

88.8 MB

Jake Appelbaum - Anonymity, Privacy, and Cirvumvention with Tor.mp4

92.1 MB

John Cran - Realities of Starting a Security Company - Entrepreneurs Panel.mp4

72.1 MB

Jon Oberheide - Linux Kernel Exploitation.mp4

39.0 MB

Josh Corman - Realities of Starting a Security Company - Investors Panel.mp4

79.8 MB

Josh Corman - Rugged Software.mp4

71.1 MB

Lenny Zeltser - Knock Knock.mp4

63.3 MB

Mary Ann Davidson - Keynote.mp4

80.8 MB

Mike Kershaw - Wifi Security.mp4

62.7 MB

Moxie Marlinspike - Changing Threats to Privacy.mp4

91.1 MB

Paul Asadoorian - Embedded System Hacking.mp4

77.4 MB

Rafal Los and Matt Wood - Into the Rabbit Hole.mp4

88.9 MB

Randolph Barr - Gain Comfort in Losing Control to the Cloud.mp4

61.2 MB

Rich Mogull - Involuntary Case Studies in Data Breaches.mp4

93.9 MB

Riley Hassell - NT Object Insecurity.mp4

59.8 MB

Robert Clark - Legal Aspects of Computer Network Security and Privacy.mp4

78.6 MB

Ron Gula - Detecting Penetration Testing.mp4

65.5 MB

Timothy Brueggemann - Understanding The Key to Protecting Highly Sensitive PII.mp4

59.0 MB

Travis Goodspeed - Breaking Zigbee Crypto.mp4

63.8 MB

Trend Micro - Measuring Security.mp4

127.1 MB

Wendy Poland and David Lenoe - Bullseye on Your Back.mp4

78.7 MB

/SOURCE 2012 Boston/

Advanced SQL Injection with SQLol - The Configurable SQLi Testbed.mp4

45.6 MB

Behind The Scenes - Pwning Satellite Cable TV.mp4

41.9 MB

Celebrating Bad Crypto.mp4

45.2 MB

Criticality, Rejectionists, Risk Tolerance - Keynote at Source Boston 2012.mp4

47.1 MB

De-constructing the Cost of a Data Breach.mp4

37.9 MB

Finding the Weak Link in Windows Binaries.mp4

38.0 MB

Games We Play - Defenses and Disincentives.mp4

59.5 MB

Inside the Duqu Command and Control Servers,.mp4

50.3 MB

Lessons Of Static Binary Analysis.mp4

55.0 MB

Media Hype in the Information Security Industry.mp4

37.0 MB

Microsoft s Response Process - 10 Years of Hard Knock Learning.mp4

57.7 MB

Mobile Snitch - Devices telling the world about you.mp4

39.6 MB

No Victims - How to Measure & Communicate Risk.mp4

51.0 MB

Perspectives of How to Develop a Winning Career in Infosec.mp4

37.8 MB

Reverse Engineering Mobile Applications.mp4

51.7 MB

SCAP for Everyone - A case study in transforming configurations.mp4

56.5 MB

SOURCE Boston 2012 - Keynote - Anonymous 20 20 - The Beginning is Near.mp4

51.0 MB

SexyDefense - Maximizing the home-field advantage.mp4

52.3 MB

Successful Application Security Programs in an Uncertain Landscape.mp4

45.0 MB

Using capture-the-flag to enhance teaching and training.mp4

32.7 MB

Voight-Kampff ing The BlackBerry PlayBook.mp4

51.6 MB

Watchtowers of the Internet - Analysis of Outbound Malware Communication.mp4

50.8 MB

What Permissions Does Your Database User REALLY Need.mp4

43.2 MB

/SOURCE 2012 Seattle/

Dr. David Rees & Karthik Raman - Why Developers And Vulnerability Researchers Should Collaborate.eng.srt

89.1 KB

Dr. David Rees & Karthik Raman - Why Developers And Vulnerability Researchers Should Collaborate.mp4

47.5 MB

Jason Bubolz & Rachel Engel - Unified Communications Information Loss Through the Front Door.eng.srt

107.6 KB

Jason Bubolz & Rachel Engel - Unified Communications Information Loss Through the Front Door.mp4

56.4 MB

Julien Sobrier - Browser Extensions The Backdoor To Stealth Malware - SOURCE Security Conference.eng.srt

89.5 KB

Julien Sobrier - Browser Extensions The Backdoor To Stealth Malware - SOURCE Security Conference.mp4

51.0 MB

Leveraging Collective Intelligence To Combat Cyber Crime - PANEL - SOURCE Security Conference.eng.srt

163.0 KB

Leveraging Collective Intelligence To Combat Cyber Crime - PANEL - SOURCE Security Conference.mp4

93.0 MB

Ofer Shezaf - RESTful Services, The Web Security Blind Spot - SOURCE Security Conference.eng.srt

88.4 KB

Ofer Shezaf - RESTful Services, The Web Security Blind Spot - SOURCE Security Conference.mp4

56.5 MB

Robert Lee - The Interim Years Of Cyberspace Security In A Domain Of Warfare.eng.srt

99.5 KB

Robert Lee - The Interim Years Of Cyberspace Security In A Domain Of Warfare.mp4

45.6 MB

Rodrigo Montoro - Scoring PDF Structure To Detect Malicious Files - SOURCE Security Conference.eng.srt

59.9 KB

Rodrigo Montoro - Scoring PDF Structure To Detect Malicious Files - SOURCE Security Conference.mp4

38.9 MB

Steve Werby & Randy Todd - Building Dictionaries And Destroying Hashes Using Amazon EC2.eng.srt

103.8 KB

Steve Werby & Randy Todd - Building Dictionaries And Destroying Hashes Using Amazon EC2.mp4

52.1 MB

Tony Rucci - Just Another Day at the Office September 11, 2001, The White House.eng.srt

87.6 KB

Tony Rucci - Just Another Day at the Office September 11, 2001, The White House.mp4

48.0 MB

William Cook and McGuire- Woods Data Breach - Let The Finger Pointing Begin.eng.srt

85.7 KB

William Cook and McGuire- Woods Data Breach - Let The Finger Pointing Begin.mp4

53.4 MB

Zach Lanier - Mapping And Evolution Of Android Permissions - SOURCE Security Conference.eng.srt

90.0 KB

Zach Lanier - Mapping And Evolution Of Android Permissions - SOURCE Security Conference.mp4

50.9 MB

/SOURCE 2013 Boston/

A Brief History of Physical Security.mp4

41.7 MB

Achievement Unlocked - Designing a compelling security awareness program.mp4

44.1 MB

Adversarial Resilience at the Planetary Scale.mp4

46.6 MB

Analysis of The BroBot DDOS Attack.mp4

53.2 MB

Analyzing the Chemistry of Data.mp4

48.4 MB

Android Modding for the Security Practitioner.mp4

44.6 MB

Attacking Cloud Services with Source Code (2).mp4

48.2 MB

Attacking Cloud Services with Source Code.mp4

48.6 MB

Avoiding Android App Security Pitfalls.mp4

45.9 MB

BYOD - The Risks, Rewards and Challenges.mp4

38.5 MB

Big Data Big Liability.mp4

42.7 MB

Birds, bots and machines - Fraud in Twitter and how to detect it using Machine Learning Techniques.mp4

50.2 MB

Blitzing with your Defense.mp4

55.0 MB

Bring Your Own Device - Keeping it Simple and Effective.mp4

54.6 MB

Browser Extensions - The Backdoor To Stealth Malware.mp4

56.7 MB

Building Dictionaries And Destroying Hashes Using Amazon EC2.mp4

55.8 MB

Building Your Own Packet Capture Platform.mp4

62.7 MB

ColdFusion for Penetration Testers.mp4

37.4 MB

Covering your - aaS - Cloud Security Case Studies for SaaS, PaaS, and IaaS.mp4

41.6 MB

Data Breach - Let The Finger Pointing Begin.mp4

60.7 MB

Distributed Security - Expanding the Toolkit for Institutional Resilience.mp4

56.8 MB

Facilitating Fluffy Forensics (a.k.a. Considerations for Cloud Forensics).mp4

56.7 MB

Games We Play - Payoffs & Chaos Monkeys.mp4

39.4 MB

Hacking Back - is a Bad Idea.mp4

35.6 MB

Hiring Recruitment.mp4

89.4 MB

Inside the Black Hole Exploit Kit (BHEK).mp4

53.9 MB

Insider Threat - Hunting for Authorized Evil.mp4

54.3 MB

JavaScript Pitfalls.mp4

57.4 MB

Just Another Day at the Office... September 11, 2001, The White House.mp4

41.7 MB

Keynote - Andy Ellis.mp4

66.3 MB

Keynote - Dan Geer & Richard Thieme.mp4

57.5 MB

Keynote - Gene Kim.mp4

37.5 MB

Lessons Of Binary Analysis.mp4

113.4 MB

Lessons of the Kobayashi Maru - If You re Not Cheating, You re Not Trying.mp4

40.4 MB

Leveraging Collective Intelligence To Combat Cyber Crime.mp4

85.4 MB

Mapping And Evolution Of Android Permissions.mp4

44.3 MB

PLC SCADA Vulnerabilities in Correctional Facilities.mp4

55.8 MB

Practical Exploitation of Embedded Systems.mp4

52.2 MB

Privacy at the Border - A Guide for Traveling with Devices.mp4

56.8 MB

Proactive Defense.mp4

46.4 MB

Protecting sensitive information on iOS devices.mp4

53.5 MB

Pwnie Express presents Practical MitM Pentesting.mp4

46.7 MB

RESTful Services, The Web Security Blind Spot.mp4

51.1 MB

Rise In ATM Compromises.mp4

47.1 MB

Scoring PDF Structure To Detect Malicious Files.mp4

35.2 MB

Strategic Analysis of the iOS Jailbreak Development Community.mp4

44.3 MB

Suicide Risk Assessment and Intervention Tactics.mp4

56.1 MB

The Base Rate Fallacy - Information Security Needs To Understand This..mp4

52.5 MB

The Interim Years Of Cyberspace - Security In A Domain Of Warfare.mp4

48.1 MB

Theory and Application of Realistic Capture the Flag Competitions.mp4

48.1 MB

Unified Communications - Information Loss Through the Front Door.mp4

61.3 MB

Vulnerabilities of Control Systems in Drinking Water Utilities.mp4

52.8 MB

We See The Future And It s Not Pretty.mp4

55.8 MB

Why Developers And Vulnerability Researchers Should Collaborate.mp4

32.7 MB

Your PCI Assessor - Best Friend or Worst Enemy You Choose....mp4

54.7 MB

/SOURCE 2015 Boston/

All That Cybers Is Not War - SOURCE Security Conference Boston 2015.eng.srt

150.2 KB

All That Cybers Is Not War - SOURCE Security Conference Boston 2015.mp4

131.9 MB

Andy Ellis - Cognitive Injection - SOURCE Security Conference Boston 2015.eng.srt

77.8 KB

Andy Ellis - Cognitive Injection - SOURCE Security Conference Boston 2015.mp4

61.6 MB

Aqua Vitae The Water of Life - Martin McKeay - SOURCE Dublin 2015.mp4

62.6 MB

Bob Rudis - Before and Beyond the Breach New Research in the 2015 DBIR.eng.srt

121.1 KB

Bob Rudis - Before and Beyond the Breach New Research in the 2015 DBIR.mp4

53.5 MB

Bugged Files Is Your Document Telling on You - Daniel Crowley and Damon Smith.eng.srt

75.5 KB

Bugged Files Is Your Document Telling on You - Daniel Crowley and Damon Smith.mp4

46.7 MB

Catherine Pearce - Multipath TCP Breaking Today’s Networks with Tomorrow’s Protocols.eng.srt

57.8 KB

Catherine Pearce - Multipath TCP Breaking Today’s Networks with Tomorrow’s Protocols.mp4

61.7 MB

Chasing Uniqueness, Understanding Normal - Neil King - SOURCE Dublin 2015.mp4

66.0 MB

Dakota Nelson - Monitoring Social Media in 5 Minutes a Week - SOURCE Security Conference.eng.srt

52.2 KB

Dakota Nelson - Monitoring Social Media in 5 Minutes a Week - SOURCE Security Conference.mp4

34.4 MB

Dan Lambright - Penetration Testing in the Cloud - SOURCE Security Conference.eng.srt

48.8 KB

Dan Lambright - Penetration Testing in the Cloud - SOURCE Security Conference.mp4

37.9 MB

Doug Wilson and Thomas Millar - Cyber Information Sharing a Means not an End.eng.srt

86.9 KB

Doug Wilson and Thomas Millar - Cyber Information Sharing a Means not an End.mp4

59.3 MB

From Tech to Exec - Panel - SOURCE Security Conference Boston 2015.eng.srt

77.6 KB

From Tech to Exec - Panel - SOURCE Security Conference Boston 2015.mp4

61.7 MB

Growing Up A Maturity Model and Roadmap for Vulnerability Management.eng.srt

54.8 KB

Growing Up A Maturity Model and Roadmap for Vulnerability Management.mp4

51.4 MB

Guillaume Ross - iOS App Analytics VS Privacy An analysis of the use of analytics.eng.srt

66.7 KB

Guillaume Ross - iOS App Analytics VS Privacy An analysis of the use of analytics.mp4

35.2 MB

Jared Carlson - A Swift Teardown - SOURCE Security Conference Boston 2015.mp4

32.2 MB

Jason Syversen - Quantifying cyber attacks to optimize and assess your defense.eng.srt

64.4 KB

Jason Syversen - Quantifying cyber attacks to optimize and assess your defense.mp4

52.4 MB

Jen Ellis - Hacking the Media for Fame and Profit - SOURCE Security Conference Boston 2015.eng.srt

138.4 KB

Jen Ellis - Hacking the Media for Fame and Profit - SOURCE Security Conference Boston 2015.mp4

79.5 MB

Jeremiah O’Connor - Using NLP to detect phishing and APT CnC domains.eng.srt

54.8 KB

Jeremiah O’Connor - Using NLP to detect phishing and APT CnC domains.mp4

47.5 MB

Jim Routh - KEYNOTE - SOURCE Security Conference Boston 2015.eng.srt

87.9 KB

Jim Routh - KEYNOTE - SOURCE Security Conference Boston 2015.mp4

82.4 MB

Josh Pyorre - Protecting your cloud server with a cloud IDS - SOURCE Security Conference.eng.srt

64.3 KB

Josh Pyorre - Protecting your cloud server with a cloud IDS - SOURCE Security Conference.mp4

58.6 MB

Maddi Wallach - Excavating for Empathy - SOURCE Security Conference Boston 2015.eng.srt

57.8 KB

Maddi Wallach - Excavating for Empathy - SOURCE Security Conference Boston 2015.mp4

91.0 MB

Mark Ostrowski and Steven Baker - Evolution of Threat - SOURCE Security Conference.eng.srt

73.9 KB

Mark Ostrowski and Steven Baker - Evolution of Threat - SOURCE Security Conference.mp4

46.9 MB

Matt Wood - Reactive JS Security Testing - Exploitation - SOURCE Security Conference.mp4

60.3 MB

Michael Roytman - Who Watches the Watchers Metrics for Security Strategy.eng.srt

95.9 KB

Michael Roytman - Who Watches the Watchers Metrics for Security Strategy.mp4

52.4 MB

Mike Murray - KEYNOTE - SOURCE Security Conference Boston 2015.eng.srt

87.4 KB

Mike Murray - KEYNOTE - SOURCE Security Conference Boston 2015.mp4

55.9 MB

Paul Asadoorian - Embedded Insecurity Can We Fix The Internet of Evil Things.eng.srt

74.2 KB

Paul Asadoorian - Embedded Insecurity Can We Fix The Internet of Evil Things.mp4

58.3 MB

Roy Wattanasin - Improving the State of Healthcare Information Security as a Security Investigator.eng.srt

69.1 KB

Roy Wattanasin - Improving the State of Healthcare Information Security as a Security Investigator.mp4

46.9 MB

Salvador Grec - Defending the Enterprise with Evernote - SOURCE Security Conference Boston 2015.eng.srt

60.1 KB

Salvador Grec - Defending the Enterprise with Evernote - SOURCE Security Conference Boston 2015.mp4

42.0 MB

Silas Cutler - Adversary Profile Gothic Panda - SOURCE Security Conference.eng.srt

53.2 KB

Silas Cutler - Adversary Profile Gothic Panda - SOURCE Security Conference.mp4

35.2 MB

Stephanie Losi - Selling for Security Professionals - SOURCE Security Conference Boston 2015.eng.srt

67.1 KB

Stephanie Losi - Selling for Security Professionals - SOURCE Security Conference Boston 2015.mp4

46.7 MB

Suzanne Schwartz - KEYNOTE - SOURCE Security Conference Boston 2015.eng.srt

84.9 KB

Suzanne Schwartz - KEYNOTE - SOURCE Security Conference Boston 2015.mp4

76.3 MB

Wade Woolwine and Josh Feinblum - Getting the most from your managed security providers.eng.srt

82.7 KB

Wade Woolwine and Josh Feinblum - Getting the most from your managed security providers.mp4

48.4 MB

Xiaoning Li - iROP Interesting ROP gadgets - SOURCE Security Conference.eng.srt

56.2 KB

Xiaoning Li - iROP Interesting ROP gadgets - SOURCE Security Conference.mp4

32.4 MB

/SOURCE 2015 Dublin/

It isn’t all foggy in the Cloud Digital Forensic Investigations in the Cloud Environment.mp4

55.3 MB

No one is coming. We are the Cavalry - Claus Haumann - SOURCE Dublin 2015.mp4

92.5 MB

Supplier Security Risk Assessment A Practical Guide - Marian Ventuneac.mp4

57.0 MB

/

SOURCE thank you.txt

0.8 KB

Source logo.jpg

24.8 KB

 

Total files 408


Copyright © 2025 FileMood.com