Chris Soghoian, who was recently hired as the ACLU's first-ever principal technologist, has never been afraid to ruffle the feathers of the corporate establishment when it comes to privacy and security issues.
Valerie Aurora and Mary Gardiner have united to form a decade-long collaboration on a variety of "women in open source" advocacy projects, including developing anti-harassment policies at conferences.
Ron Ross is helping to lead the development of new standards and controls that security professionals can use to safeguard their organizations against today's internet threat paradigms.
Michael Coates, director of security assurance at Mozilla and chairman of OWASP, is a steadfast supporter of open-source methods to safeguard users against security and privacy threats.
Gabriella Coleman, professor at McGill University in Montreal and avid observer of the Anonymous online collective, has become one of the pre-eminent thought leaders on the hacktivist culture.
Software architect Troy Hunt explains how a common Facebook spam campaign functions.
To get a better understanding of how the show is shaping up, we caught up with Trey Ford, the newly appointed general manager of Black Hat, who discussed his transformation from booth babe to conference organizer, how the numbers stack up this year, which sessions are on his can't-miss list and why the parties are just as important to attend as daytime talks.
Tom Kellermann, vice president of cyber security at Trend Micro, joined me on the SC Magazine podcast to discuss an APT campaign known as IXESHE, which is going after sensitive targets from Asia to Germany. But its command-and-control infrastructure really is what makes it special.
If a data breach occurs, when are companies more likely to be sued by consumers or employees? A Carnegie Mellon University researcher joined me on the SC Magazine Podcast to discuss.
Awareness training is finally becoming more about security and less about compliance, as SANS instructor Lance Spitzner discusses in this SC Magazine Podcast episode.
Sign up to our newsletters
SC Magazine Articles
- Yahoo breach; State-sponsored actors suspected, at least 500 million accounts affected
- Education sector bullied by ransomware and can barely defend itself, report
- Cisco warns of exploitation of new flaws linked to Shadow Brokers exploits
- DetoxCrypto ransomware imitates Malwarebytes software
- House Committee urges Obama not to pardon Snowden
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Hard Rock Hotel & Casino Las Vegas hit with POS breach
- X-ray and MRI machines among devices used as springboards for data breach attacks
- Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?
- Hacker purportedly selling over 650,000 stolen medical records on dark web marketplace