When you check into a hotel room, do you see the elegantly understated, calm yet energising modern styling, providing you with the ultimate in traveller comfort, or is it the hotel safe, pay per view tv, automated minibar and RFID door lock that gets your attention? Is the ATM in the lobby a convenient place […]Read more
Andrew Nash senior director of identity services, PayPal Consumers have too many online identities – they must remember dozens of accounts and passwords, consumer Internet interactions are repetitive, frustrating and littered with outdated information. The scale of the problem is immense; hundreds of millions of Internet users interact with tens of millions of Internet Service […]Read more
The Frogs Who Desired A King: A Virtualization and Cloud Computing Security Fable Set To Interpretive Dance
Aesop wrote a little ditty about some discontented frogs who lived in a pond. They asked Zeus for a new King. They got one. It ate them. The moral of this story is “be careful what you wish for as you might just get it.” The corresponding analog is that of virtualization and cloud security. […]Read more
Based on the book No-Tech Hacking, this presentation shows life through the eyes of today’s hacker. I’ll show what kinds of tactics a hacker will employ and the perspective they have that allows them to stay one step ahead of the good guys. I’ll focus on the hacker mind, showing in a compelling way the […]Read more
Known by most by his email name, ‘Stepto’, Stephen Toulouse was involved in some of the most fundamental security incidents and decisions made at Microsoft over the past several years. In 2007 Stepto moved from Microsoft’s Trustworthy Computing division to pursue his lifelong dream of being paid to play video games and work for the […]Read more
Enter your contact information below to have future blog posts delivered directly to your inbox!