Open in app

Sign In

Write

Sign In

DeepSec Conference
DeepSec Conference

306 Followers

Home

About

Apr 8, 2021

Software Architecture, Code, and Information Security

Information security is tightly linked with the code running on platforms and decisions made during the software architecture planning phase. One can trace a lot of results in penetration tests to workarounds caused by inadequate tools, bad design choices, trends in software development, legacy applications, and too optimistic testing strategies…

2 min read

2 min read


Mar 31, 2021

All your Content are belong to Us — how the Crypto Wars continue

Encryption is one of our favourite topics. This blog and our events feature discussions, tools, and content regarding cryptography. The first DeepSec conference in 2007 even had a presentation about a practical attack on GSM’s A5/1 algorithm. Subsequent conferences followed up on this, for example, the state of affairs of…

2 min read

All your Content are belong to Us — how the Crypto Wars continue
All your Content are belong to Us — how the Crypto Wars continue

2 min read


Mar 24, 2021

Call for IoT Trainings: Secure Development for embedded Devices

The world is much easier to handle without limits. If you have all your frameworks freely available and have the luxury of running your code with a multi-MB (or -GB) runtime environment, then you are in paradise. The world of embedded devices and the Internet of Things looks different. Saving…

2 min read

2 min read


Mar 19, 2021

Secure Operation of IT Systems requires Skills, no Short-cuts

The recent vulnerability in the Microsoft® Exchange server application has sparked many discussions. One of the topics is connected to the skills of IT departments responsible for patching systems in time. How can n weeks or months pass until upgrades are rolled out and in place? Well, the answer is…

3 min read

3 min read


Mar 15, 2021

Bug Disclosure Policies and the Eternal Discussion about Security ♨

In theory, there is the evolution from bug over to weakness, vulnerability and finally the exploit. Errors in code and application behaviour are interesting for any serious developer. Security researchers also look for bugs and ways to make code do something it wasn’t designed for. In the absence of critical…

2 min read

2 min read


Mar 1, 2021

DeepSec 2021 — Call for Papers is open

DeepSec 2021 is looking for your ideas, solutions, incident reports, insights, and expertise. The call for papers is open. You can submit your contribution via our call for papers manager online. …

2 min read

2 min read


Sep 17, 2020

DeepSec2020 Press Release: Industrial control systems put to the test. DeepSec conference organizes forum for the protection of Industrial Control Systems (ICS)

When one talks about digitization, one usually means networked control and measurement systems. The associated technical term Industrial Control Systems (ICS) covers a wide area and extends into Industry 4.0, in which information security plays a very important role. The right design and secure code thus become part of critical…

Deepsec

4 min read

DeepSec2020 Press Release: Industrial control systems put to the test.
DeepSec2020 Press Release: Industrial control systems put to the test.
Deepsec

4 min read


Sep 16, 2020

DeepSec2020 Talk: The Art Of The Breach — Robert Sell

The Art of the Breach is designed to be a journey for anyone interested in physical security. Robert takes the audience on a trip from the public sidewalk outside a target organization all the way through to the executive filing cabinet in the President’s office. While many physical security talks…

Deepsec

3 min read

Deepsec

3 min read


Sep 14, 2020

DeepSec 2020 Talk: Abusing Azure Active Directory: Who Would You Like To Be Today? — Dr. Nestori Syynimaa

This will be one of the few online talks held at DeepSec. Dr. Nestori Syynimaa covers the wonderful world of Azure AD and third-party code. Azure AD is used by Microsoft Office 365 and over 2900 third-party apps. Although Azure AD is commonly regarded as secure, there are serious vulnerabilities…

Information Security

3 min read

Information Security

3 min read


Sep 11, 2020

Reminder for your Training @ DeepSec 2020: Bypassing CSP via ajax.googleapis.com — Dawid Czagan

Content Security Policy (CSP) is the number one defensive technology in modern web applications. A good CSP offers a lot of possibilities…

Deepsec

2 min read

Reminder for your Training @ DeepSec 2020: Bypassing CSP via ajax.googleapis.com — Dawid Czagan
Reminder for your Training @ DeepSec 2020: Bypassing CSP via ajax.googleapis.com — Dawid Czagan
Deepsec

2 min read

DeepSec Conference

DeepSec Conference

306 Followers

The In-Depth Security Conference in the Heart of Europe.

Following
  • Dan Martell

    Dan Martell

  • Jim Geovedi

    Jim Geovedi

  • Tarah Wheeler

    Tarah Wheeler

  • Rik Ferguson

    Rik Ferguson

  • Jon Freeman

    Jon Freeman

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech