Tumblelog by Soup.io
Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.

February 02 2017

January 27 2017

Putting the Science into Security – Infosec with Style

The world of information security is full of publications. It’s like being in a maze of twisted little documents, all of them alike. Sometimes these works of art lack structure, deep analysis, or simply reproducibility. Others are perfectly researched, contain (a defence of) arguments, proofs of concept, and solid code or documentation to make a point. […]

The post Putting the Science into Security – Infosec with Style appeared first on .

January 26 2017

The Sound of „Cyber“ of Zero Days in the Wild – don’t forget the Facts

The information security world is full of buzzwords. This fact is partly due to the relationship with information technology. No trend goes without the right amount of acronyms and leetspeaktechnobabble. For many decades this was not a problem. A while ago the Internet entered mainstream. Everyone is online. The digital world is highly connected. Terms […]

The post The Sound of „Cyber“ of Zero Days in the Wild – don’t forget the Facts appeared first on .

January 21 2017

Putting the Context into the Crypto of Secure Messengers

Every once in a while the world of encrypted/secure/authenticated messaging hits the wall of usability. In the case for email Pretty Good Privacy (PGP) is an ancient piece of software. These days we have modern tools such as GnuPG, but the concept of creating keys, verifying identities (i.e. determining who is to trust), synchronising trust/keys […]

The post Putting the Context into the Crypto of Secure Messengers appeared first on .

February 02 2017

January 27 2017

Putting the Science into Security – Infosec with Style

The world of information security is full of publications. It’s like being in a maze of twisted little documents, all of them alike. Sometimes these works of art lack structure, deep analysis, or simply reproducibility. Others are perfectly researched, contain (a defence of) arguments, proofs of concept, and solid code or documentation to make a point. […]

The post Putting the Science into Security – Infosec with Style appeared first on .

January 26 2017

The Sound of „Cyber“ of Zero Days in the Wild – don’t forget the Facts

The information security world is full of buzzwords. This fact is partly due to the relationship with information technology. No trend goes without the right amount of acronyms and leetspeaktechnobabble. For many decades this was not a problem. A while ago the Internet entered mainstream. Everyone is online. The digital world is highly connected. Terms […]

The post The Sound of „Cyber“ of Zero Days in the Wild – don’t forget the Facts appeared first on .

February 02 2017

January 27 2017

Putting the Science into Security – Infosec with Style

The world of information security is full of publications. It’s like being in a maze of twisted little documents, all of them alike. Sometimes these works of art lack structure, deep analysis, or simply reproducibility. Others are perfectly researched, contain (a defence of) arguments, proofs of concept, and solid code or documentation to make a point. […]

The post Putting the Science into Security – Infosec with Style appeared first on .

February 02 2017

DeepSec 2016 (c)Joanna Pianka
Older posts are this way If this message doesn't go away, click anywhere on the page to continue loading posts.
Could not load more posts
Maybe Soup is currently being updated? I'll try again automatically in a few seconds...
Just a second, loading more posts...
You've reached the end.

Don't be the product, buy the product!

Schweinderl