ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

#HITBGSEC

Автор: Hack In The Box Security Conference

Загружено: 2017-09-24

Просмотров: 838

Описание: The number of IoT devices is growing at an alarming rate. Many of these devices go unnoticed. The problem is that the software used by many of these devices lack basic security measures that we take for granted in regular computer software. Furthermore, security advisories are almost non-existent for IoT. During this talk I will set the stage for how IoT is dramatically increasing the attack surface available to threat actors. I will show how IoT devices have already been utilized for attacks (such as the Mirai botnet), how difficult it can be to fix IoT security issues as well as illustrating some changes that need to happen in the industry to enable us to securely use IoT going forward.

===

Earl Carter has always had a passion for solving puzzles and understanding how things operate. Mr Carter quickly learned that identifying security weaknesses is just like solving puzzles. Almost 20 years ago, he was introduced to network security when he accepted a position at the Airforce Information Warfare center in San Antonio, Texas. In 1998, Mr Carter starting working Cisco and became one of the founding members on the Security Technology Assessment Team (STAT). After spending 15 years identifying new security threats and assisting product teams in hardening their devices and software to mitigate those identified security threats, Mr Carter became a Threat Researcher for Cisco Talos. Now he spends his time hunting for new threats against live customer networks by examining various intelligence feeds and data sources. Among Mr Carter’s significant contributions to Cisco are multiple security patents and authoring three Cisco Press Security Books along with co-authoring three more Cisco Press Security Books.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
#HITBGSEC

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

#HITBGSEC 2017 KEYNOTE 1 - Finding Vulns And Malware In Open Source Code At Scale - Mark Curphey

#HITBGSEC 2017 KEYNOTE 1 - Finding Vulns And Malware In Open Source Code At Scale - Mark Curphey

#HITB2024BKK #COMMSEC D1: How a Combination of Bugs in KakaoTalk Compromises User Privacy

#HITB2024BKK #COMMSEC D1: How a Combination of Bugs in KakaoTalk Compromises User Privacy

Deep Techno 24/7 🔴 Live Stream

Deep Techno 24/7 🔴 Live Stream

Chill House for a Calm Focus — LIVE

Chill House for a Calm Focus — LIVE

Smooth Jazz & Soul R&B 24/7 – Soul Flow Instrumentals

Smooth Jazz & Soul R&B 24/7 – Soul Flow Instrumentals

#HITB2024BKK #COMMSEC D2: Breaking Fake Voice Detection with Speaker-Irrelative Features

#HITB2024BKK #COMMSEC D2: Breaking Fake Voice Detection with Speaker-Irrelative Features

Jacek Bartosiak: załamanie łańcuchów dostaw i rynek leków w Europie

Jacek Bartosiak: załamanie łańcuchów dostaw i rynek leków w Europie

#HITB2024BKK #COMMSEC D2: Detecting Botnets via DNS Traffic Analysis Using Machine Learning

#HITB2024BKK #COMMSEC D2: Detecting Botnets via DNS Traffic Analysis Using Machine Learning

⚡️ Окружение с трёх сторон началось || Крупнейший в мире объект поражён

⚡️ Окружение с трёх сторон началось || Крупнейший в мире объект поражён

KEBAB DLA INFLUENCERA vs. KEBAB DLA ZWYKŁEGO KLIENTA

KEBAB DLA INFLUENCERA vs. KEBAB DLA ZWYKŁEGO KLIENTA

МЕТОДЫ ПЕРЕДАЧИ ДАННЫХ

МЕТОДЫ ПЕРЕДАЧИ ДАННЫХ

Best of Deep House [2026] | Melodic House & Progressive Flow

Best of Deep House [2026] | Melodic House & Progressive Flow

Relaxing Chillout Music – Café del Mar Inspired Ibiza Vibes 🌅 24/7 Sunset Lounge Radio

Relaxing Chillout Music – Café del Mar Inspired Ibiza Vibes 🌅 24/7 Sunset Lounge Radio

#OOTB2025BKK - Cloud Edge Phishing: Breaking The Future Of Auth - Carlos Gómez Quintana

#OOTB2025BKK - Cloud Edge Phishing: Breaking The Future Of Auth - Carlos Gómez Quintana

#OOTB2025BKK - Build Your Own SOC - Kristen Huang

#OOTB2025BKK - Build Your Own SOC - Kristen Huang

Путь в Пентест 2026: Offsec Telegram, HTB, OSCP, Базовый минимум - Быстрый обзор

Путь в Пентест 2026: Offsec Telegram, HTB, OSCP, Базовый минимум - Быстрый обзор

#HITB2024BKK #COMMSEC D1: CoralRaider Targets Victims Data and Social Media Accounts

#HITB2024BKK #COMMSEC D1: CoralRaider Targets Victims Data and Social Media Accounts

Часы приема: Вопросы и ответы по базам данных на вершине горы.

Часы приема: Вопросы и ответы по базам данных на вершине горы.

GAZ DROŻEJE, PRODUKCJA SPADA. ZŁOŻA I PRODUCENCI POD OSTRZAŁEM

GAZ DROŻEJE, PRODUKCJA SPADA. ZŁOŻA I PRODUCENCI POD OSTRZAŁEM

#HITB2024BKK #COMMSEC D2: Leveraging LLMs to Enhance Insider Threat Investigation Capabilities

#HITB2024BKK #COMMSEC D2: Leveraging LLMs to Enhance Insider Threat Investigation Capabilities

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]