A day in the life of a hacker…

When you check into a hotel room, do you see the elegantly understated, calm yet energising modern styling, providing you with the ultimate in traveller comfort, or is it the hotel safe, pay per view tv, automated minibar and RFID door lock that gets your attention? Is the ATM in the lobby a convenient place […]

Read more

Consumer Internet Identity.

Andrew Nash senior director of identity services, PayPal Consumers have too many online identities – they must remember dozens of accounts and passwords, consumer Internet interactions are repetitive, frustrating and littered with outdated information. The scale of the problem is immense; hundreds of millions of Internet users interact with tens of millions of Internet Service […]

Read more

The Frogs Who Desired A King: A Virtualization and Cloud Computing Security Fable Set To Interpretive Dance

Aesop wrote a little ditty about some discontented frogs who lived in a pond. They asked Zeus for a new King. They got one. It ate them. The moral of this story is “be careful what you wish for as you might just get it.” The corresponding analog is that of virtualization and cloud security. […]

Read more

Opening Keynote

Opening Keynote” – David Black, Manager, Cyber Infrastructure Protection Section RCMP, Technical Security Branch

Read more

Security in the Real World

Security in the Real World – Panel of Experts

Read more

No-Tech Hacking

Based on the book No-Tech Hacking, this presentation shows life through the eyes of today’s hacker. I’ll show what kinds of tactics a hacker will employ and the perspective they have that allows them to stay one step ahead of the good guys. I’ll focus on the hacker mind, showing in a compelling way the […]

Read more

What I took with me when I ‘left’ Computer Security

Known by most by his email name, ‘Stepto’, Stephen Toulouse was involved in some of the most fundamental security incidents and decisions made at Microsoft over the past several years. In 2007 Stepto moved from Microsoft’s Trustworthy Computing division to pursue his lifelong dream of being paid to play video games and work for the […]

Read more

Web Application Worms: The Future of Browser Insecurity

The traditional conception of web application security covers how attacks piggyback HTTP(S) through a firewall to attack servers. Yet this is a bidirectional path; web browsers can be attacked by compromised sites with malicious payloads. Such attacks exploit assumptions of trust and security between the browser and web site. HTML, JavaScript and similar engines like […]

Read more
Subscribe to the Sector Blog
Enter your contact information below to have future blog posts delivered directly to your inbox!