If you would like to learn more about the IAEA’s work, sign up for our weekly updates containing our most important news, multimedia and more. The growing range and number of cyber threats means that ...
Microsoft announced it will host a special conference in September to discuss the lessons and security measures the industry can take away from the CrowdStrike computer shutdown in July. The Windows ...
We know DEF CON and Vegas can be a lot. If you're a friend of Bill W who's looking for a meeting or just a place to collect yourself, DEF CON 31 has you covered. Join us throughout the conference in ...
Computer security conferences tend to be male-dominated affairs. It’s not that women aren’t present, but just not anywhere near their normal proportional representation in society. To address the ...
What happens when you bum rush conference security? It happens to me all the time. I lose my conference badge and have to get past a couple of convention center security guards to cover a keynote.
What happens when you bum rush conference security? It happens to me all the time. I lose my conference badge and have to get past a couple of convention center security guards to cover a keynote.
IoT security and privacy, mobile security and privacy, network security and privacy, digital forensics. Xinwen Fu, Ph.D., is a professor in the Miner School of Computer & Information Sciences, ...
Data-Driven Defense Evangelist at KnowBe4 Roger A. Grimes is a Data-Driven Defense Evangelist at KnowBe4. He is a 30-year computer security professional, author of 12 books and over 1,000 national ...