Software Architecture, Code, and Information SecurityInformation security is tightly linked with the code running on platforms and decisions made during the software architecture planning…Apr 8, 2021Apr 8, 2021
Call for IoT Trainings: Secure Development for embedded DevicesThe world is much easier to handle without limits. If you have all your frameworks freely available and have the luxury of running your…Mar 24, 2021Mar 24, 2021
Secure Operation of IT Systems requires Skills, no Short-cutsThe recent vulnerability in the Microsoft® Exchange server application has sparked many discussions. One of the topics is connected to the…Mar 19, 2021Mar 19, 2021
Bug Disclosure Policies and the Eternal Discussion about Security ♨In theory, there is the evolution from bug over to weakness, vulnerability and finally the exploit. Errors in code and application…Mar 15, 2021Mar 15, 2021
DeepSec2020 Press Release: Industrial control systems put to the test.When one talks about digitization, one usually means networked control and measurement systems. The associated technical term Industrial…Sep 17, 2020Sep 17, 2020
DeepSec2020 Talk: The Art Of The Breach — Robert SellThe Art of the Breach is designed to be a journey for anyone interested in physical security. Robert takes the audience on a trip from the…Sep 16, 2020Sep 16, 2020
DeepSec 2020 Talk: Abusing Azure Active Directory: Who Would You Like To Be Today?This will be one of the few online talks held at DeepSec. Dr. Nestori Syynimaa covers the wonderful world of Azure AD and third-party code.Sep 14, 2020Sep 14, 2020
Reminder for your Training @ DeepSec 2020: Bypassing CSP via ajax.googleapis.com — Dawid CzaganContent Security Policy (CSP) is the number one defensive technology in modern web applications. A good CSP offers a lot of possibilities…Sep 11, 2020Sep 11, 2020