lies and damn lies: getting past the hype of endpoint security solutions
Published 6 years ago • 27K plays • Length 49:18Download video MP4
Download video MP3
Similar videos
-
50:38
keynote: the seven axioms of security
-
50:37
practical approach to automate the discovery & eradication of open-source software vulnerabilities
-
31:53
pulling back the curtain on airport security: can a weapon get past tsa?
-
50:01
abusing windows management instrumentation (wmi)
-
49:51
betraying the bios: where the guardians of the bios are failing
-
33:36
black hat 2013 - exploiting network surveillance cameras like a hollywood hacker
-
42:15
defcon 19: diy non-destructive-entry
-
49:42
defcon 17: stealing profits from spammers or: how i learned to stop worrying and love the spam
-
45:58
day 1 keynote: national cyber-aggression and private-sector internet infrastructure
-
48:51
lost in transaction: process doppelgänging
-
51:37
the adventures of av and the leaky sandbox
-
44:29
breaking the x86 instruction set
-
54:54
black hat asia 2018 keynote: a short course in cyber warfare by the grugq
-
50:58
48 dirty little secrets cryptographers don’t want you to know
-
54:29
invoke-dosfuscation: techniques for %f in (-style) do (s-level cmd obfuscation)
-
45:40
go to hunt, then sleep
-
44:06
cracking the lens: targeting http's hidden attack-surface