Stories From the Founder of ShmooCon

Stories from the Founder of ShmooCon

Bruce Potter has had a more eclectic career than most in cybersecurity. He has run an Alaskan ISP on a shoestring and walked the halls of government contractors, where everything had to be signed in triplicate. In the meantime, he’s visited pretty much everywhere else in between. He also runs popular security conference ShmooCon when he […]

Read more
Keren Elazari - How Hackers Are Changing the World Together

How Hackers Are Changing the World Together

Keren Elazari has spent her life researching and participating in hacker communities. The Israeli-born cybersecurity expert, a senior researcher at the Tel Aviv University Interdisciplinary Cyber Research Center, founded BSides Tel Aviv and is a strong advocate for those ethical hackers who break things to make them stronger. Her keynote address at SecTor 2018 focused […]

Read more
Mark Nunnikhoven Are We Set UP To Fail

Are We Setup To Fail?

If security was just a case of patching software and checking malware hashes, it would be easy. In reality, it’s difficult. Really, really difficult. Mark Nunnikhoven, vice president of cloud research at Trend Micro, spent his SecTor 2018 keynote talking about why and how we got here. We sat down with him to discuss his […]

Read more
A Conversation With The Invisible Man

A Conversation With The Invisible Man

Not everyone can sit in a meeting with hard-headed senior officials at a major defence contractor and introduce themselves as Freaky Clown. But this guy can. When you’ve broken into thousands of military and government buildings, you get a certain level of self confidence. Freaky Clown, who calls himself FC for short, is a UK-based […]

Read more
When Smart Contracts Aren't So Smart

When Smart Contracts Aren’t So Smart

Sarah Friend and John (J) Maurelian are smart contract security gurus, at a time when most people still don’t really know what a smart contract is. The software experts, from Ethereum development studio Consensys, spend their time rooting out programming flaws that could cost blockchain users hundreds of thousands of dollars, and they’re ready to tell some […]

Read more

Fixing Insecure Code, One Developer At A Time

When she moved from coding into security, Tanya Janca just couldn’t bring herself to leave software development alone. That’s a good thing for the rest of us. When she found cross-site scripting (XSS) problems cropping up in one developer’s code, she asked if it would be ok to come spend some time with him at […]

Read more
when clouds rain data

How A Map of the Cloud Leaked Online

Another day, another treasure trove left publicly available in the cloud by a hapless admin. This time, GoDaddy found the configuration details for its servers in full public view on an Amazon Simple Storage Services (S3) bucket. Security firm UpGuard discovered the data languishing online in June stored on the Amazon service, which enables customers […]

Read more

Can A Standard Framework Make Cyber-Insurance Easier?

Rising data breaches and increasing compliance concerns are increasing interest in insurance against cyberattacks, but taking out cyber-insurance policies can be complex and uncertain. How can companies make it easier? At the 2017 SecTor conference last November, we sat down with Dave Millier, founder and CEO of security services company Uzado, to talk about a […]

Read more

Why Cryptocurrency Is An Easy Target For Thieves

Another day, another cryptocurrency hack. Earlier this month, cryptocurrency conversion platform Bancor lost $23.5m in cryptocurrency after hackers managed to compromise a wallet. Attackers stole $12.5m in Ether, $1m of Pundi X tokens, and $10m of Bancor Network Tokens (BNT), which are smart tokens used to convert other currencies. Bancor managed to freeze the BNT, […]

Read more

How Blockchain Technology Could Secure Your Data

How much data are you giving up just to access financial services, get paid, or simply buy liquor? Recently, this writer did some work for a large company that onboarded suppliers and processed payments through a third party service bureau. Part of the process involved proving that I was qualified to work in Canada. For […]

Read more
Modelling Success in Cybersecurity

Modelling Success in Cybersecurity

Allison Miller knows a lot about risk. The senior vice president of engineering at Bank of America spent most of her career modelling and mitigating it for companies in the financial and gaming sector. When we interviewed her at SecTor 2017 last November, she was product manager for security and privacy at Google. She spent […]

Read more
Subscribe to the Sector Blog
Enter your contact information below to have future blog posts delivered directly to your inbox!
Fields marked with an * are required