- Présentations
- Documents
- Infographies
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Anton Chuvakin
•
il y a 12 ans
Detection Rules Coverage
Sunny Neo
•
il y a 4 ans
Проектировка IPv6-оnly датацентра в Яндексе. Никита Широков
Yandex
•
il y a 9 ans
Карта граблей на поле сбора и доставки логов. Lazada-way / Юрий Бушмелев (Lazada)
Ontico
•
il y a 6 ans
A CouNtry's Honerable n3twork deviCes
grutz
•
il y a 11 ans
Assume Compromise
Zach Grace
•
il y a 8 ans
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp and windows defender atp
BlueHat Security Conference
•
il y a 5 ans
Red Team Apocalypse
Beau Bullock
•
il y a 6 ans
From Gates to Guardrails: Alternate Approaches to Product Security
Jason Chan
•
il y a 10 ans
Carlos García - Pentesting Active Directory [rooted2018]
RootedCON
•
il y a 6 ans
Pay attention to that man behind the curtain: Current state of Hacking Back
x0rz x0rz
•
il y a 6 ans
Culture
Reed Hastings
•
il y a 14 ans
Web micro-framework BATTLE!
Richard Jones
•
il y a 12 ans