A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:


BSides Boston 2015 Videos (Hacking Illustrated Series InfoSec Tutorial Videos)

BSides Boston 2015 Videos

These are the videos BSides Boston 2015. Thanks to @plaverty9 for inviting me out to record.


The Securitized State: Where it came from, where it's going, what can be done about it
Molly Sauter

Track 1

Is Threat Modeling for Me?
Robert Hurlbut

Hacker or criminal? Repairing the reputation of the infosec community.
Melanie Ensign

Running Away from Security: Web App Vulnerabilities and OSINT Collide
Micah Hoffman

Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Program
Paul Asadoorian

Protect Your "Keys to the Kingdom" _ Securing Against the Next Inevitable Cyberattack
Paul Kozlov

In pursuit of a better crypto puzzle
Samuel Erb

Track 2

When penguins attack - Linux's role in the malware ecosystem
Chester Wisniewski

The Benefits in Externalizing DMZ-as-a-Service in the Cloud
Israel Barak

Common misconfigurations that lead to a breach
Justin Tharpe

Applying Big Data technology to security use case
Max Pevzner

Marketing: They're not all Schmucks.
Jen Ellis & Josh Feinblum

Next-Gen Incident Management - Building out a Modern Incident Management Capability
John McDonald



Printable version of this article

15 most recent posts on Irongeek.com:

If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast