Posted by:
admin
9 years, 3 months ago
UPDATE: It was pointed out that these are the videos for 2014. DUH. Learn to read before rushing off to try to help.
I was not able to go to BSidesLV 2015 this summer. Luckily, the talks were recorded. Below is the list of talks on Youtube, presented drama-free:
- Opening keynote beyond good and evil towards effective security - Adam Shostack
- USB write blocking with USBProxy Dominic Spill
- Allow myself to encrypt myself evan davison
- What reaction to packet loss reveals about a vpn anna shubina sergey bratus
- Untwisting the Mersenne Twister: How I killed the PRNG - moloch & Dan 'AltF4' Petro
- Anatomy of memory scraping, credit card stealing POS malware
Amol Sarwate - Cluck Cluck: On Intel's Broken Promises - Jacob Torrey
- A Better Way to Get Intelligent About Threats - Adam Vincent
- Bring your own Risky Apps Michael Raggo - Kevin Watkins
- Invasive Roots of Anti-Cheat Software - Alissa Torres
- Vaccinating Android Milan Gabor - Danijel Grah
- Security testing for Smart Metering Infrastructure Steve Vandenberg - Robert Hawk
- The Savage Curtain Tony Trummer - Tushar Dalvi
- We Hacked the Gibson! Now what? - Philip Young
Proving Ground:
- #edsec: Hacking for Education - Jessy Irwin
- Securing Sensitive Data: A Strange Game - Jeff Elliot
- Brick in the Wall vs Hole in the Wall - Caroline D Hardin
- Cut the sh**: How to reign in your IDS - Tony Robinson/da_667
- Geek Welfare -- Confessions of a Convention Swag Hoarder - Rachel Keslensky
- No InfoSec Staff? No Problem. - Anthony Czarnik
- Can I Code Against an API to Learn a Product? - Adrienne Merrick-Tagore
- Bridging the Air Gap: Cross Domain Solutions - Patrick Orzechowski
- Back Dooring the Digital Home - David Lister
- iOS URL Schemes: omg:// - Guillaume K. Ross
- Oops, That Wasn't Suppossed To Happen: Bypassing Internet Explorer's Cross Site Scripting Filter - Carlos Munoz
- What I've Learned As A Con-Man - MasterChen
- Training with Raspberry Pi - Nathaniel Davis
- Black Magic and Secrets: How Certificates Influence You! - Robert Lucero
- Attacking Drupal Greg Foss
- Hackers vs Auditors - Dan Anderson
- Third-Party Service Provider Diligence: Why are we doing it all wrong? - Patrice Coles
- Pwning the hapless or How to Make Your Security Program Not Suck - Casey Dunham - Emily Pience
- Teach a man to Phish... - Vinny Lariza
- The Lore shows the Way - Eric Rand
Common Ground:
- SHA-1 backdooring and exploitation - Jean-Philippe Aumasson
- Evading code emulation: Writing ridiculously obvious malware that bypasses AV - Kyle Adams
- Security Management Without the Suck Tony Turner Tim Krabec
- Malware Analysis 101 - N00b to Ninja in 60 Minutes - grecs
- Travel Hacking With The Telecom Informer - TProphet
- The untold story about ATM Malware - Daniel Regalado
- Using Superpowers for Hardware Reverse Engineering - Joe Grand
- Why am I surrounded by friggin' idiots?!? (Because you hired them!) - Stephen Heath
- Demystiphying and Fingerprinting the 802.15.4/ZigBee PHY - Ira Ray Jenkins, Sergey Bratus
- Insider Threat Kill Chain: Human Indicators of Compromise - Ken Westin
- A Place to Hang Our Hats: Security Community and Culture - Domenic Rizzolo
- Booze, Devil's Advocate, and Hugs: the Best Debates Panel You'll See at BSidesLV 2014
David Mortman • Joshua Corman • Jay Radcliffe • Zach Lanier • David Kennedy
Ground Truth:
- The Power Law of Information - Michael Roytman
- Measuring the IQ of your Threat Intelligence feeds - Alex Pinto • Kyle Maxwell
- Strategies Without Frontiers - Meredith L. Patterson
- ClusterF*ck - Actionable Intelligence from Machine Learning - Mike Sconzo
- Know thy operator - Misty Blowers
- Improving security by avoiding traffic and still get what you want in data transfers - Art Conklin
- The Semantic Age - or - A Young Ontologist's Primer - Conrad Constantine
- I Am The Cavalry Q&A
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)