Chris Soghoian, who was recently hired as the ACLU's first-ever principal technologist, has never been afraid to ruffle the feathers of the corporate establishment when it comes to privacy and security issues.
Valerie Aurora and Mary Gardiner have united to form a decade-long collaboration on a variety of "women in open source" advocacy projects, including developing anti-harassment policies at conferences.
Ron Ross is helping to lead the development of new standards and controls that security professionals can use to safeguard their organizations against today's internet threat paradigms.
Michael Coates, director of security assurance at Mozilla and chairman of OWASP, is a steadfast supporter of open-source methods to safeguard users against security and privacy threats.
Gabriella Coleman, professor at McGill University in Montreal and avid observer of the Anonymous online collective, has become one of the pre-eminent thought leaders on the hacktivist culture.
Software architect Troy Hunt explains how a common Facebook spam campaign functions.
To get a better understanding of how the show is shaping up, we caught up with Trey Ford, the newly appointed general manager of Black Hat, who discussed his transformation from booth babe to conference organizer, how the numbers stack up this year, which sessions are on his can't-miss list and why the parties are just as important to attend as daytime talks.
Tom Kellermann, vice president of cyber security at Trend Micro, joined me on the SC Magazine podcast to discuss an APT campaign known as IXESHE, which is going after sensitive targets from Asia to Germany. But its command-and-control infrastructure really is what makes it special.
If a data breach occurs, when are companies more likely to be sued by consumers or employees? A Carnegie Mellon University researcher joined me on the SC Magazine Podcast to discuss.
Awareness training is finally becoming more about security and less about compliance, as SANS instructor Lance Spitzner discusses in this SC Magazine Podcast episode.
Sign up to our newsletters
SC Magazine Articles
- Impact of Linux bug 'grinch' spans servers, workstations, Android devices and more
- More than 100K WordPress sites compromised by malware due to plugin vulnerability
- Phishing email contains Word doc, enabling macros leads to malware infection
- Critical 'Misfortune Cookie' bug puts millions of internet-connected routers at risk
- White House calls Sony hack a "serious national security matter," gov't mulls proper response