This class focuses on how to manage software development projects for vehicle manufacturing applications.
------------------------------------------------------------
A talk about the history of the culture hackers built over 4 decades told from three perspectives; media, government, and the culture itself, showing how the US government came to view hackers as a commodity rather than a menace.
A broad discussion on information security and the future of linux exploitation.
A look at vulnerabilities on modern locomotives.
------------------------------------------------------------
A fun cooking stream and chat with Bryson Bort!
The tech industry has given us so many important advancements in the quality of human life. But who's life is truly improved by it? In this talk, Emily considers the blind corners that exist in technological development and the hidden communities that bear the burden of our modern technological comforts.
------------------------------------------------------------
Red teaming in ICS differs from red teaming in IT environments. In this talk, Emily Crose and Chris Nourrie discuss some of those differences, along with some tools and techniques Dragos' red team uses in client engagements.
The history of illicit information transfer crosses directly over microdots. In this talk, Emily talks about the production process and how you can make a microdot at home with simple household items.
Asking the government questions isn't as hard as you'd think. In this talk, Emily explains how to use the Freedom of Information Act to get answers to questions you have for the US Government.
In this talk, Emily discusses the use and overuse of human resources in security operations. She also mentions the "mechanical Turk" problem that currently exists in the application of 'artificial intelligence' driven security products.
------------------------------------------------------------
A discussion with former head curator of the International Spy Museum, Dr. Vince Houghton.
Emily takes a deep dive into a fast flux malware campaign found in in 2018. She also helps the audience understand how these campaigns work and why they are effective.
------------------------------------------------------------
Emily takes a deep dive into a fast flux malware campaign found in in 2018. She also helps the audience understand how these campaigns work and why they are effective.
Can machine learning be adapted to determine the background of symbolism? In this talk, Emily explains how she used a program called 'Tensorflow' to identify and label white nationalist symbolism.