Ryan Lane talks about the concepts and tooling for wrangling identity, access management, and secrets (passwords, ssl certificates, access tokens, etc.) in cloud services.
Chris Rohlf talks about how we look at offense in a world of large containerized deployments and ephemeral environments, explaining why the traditional model is no longer relevant.
Christina Camilleri talks about how social engineering can be used in conjunction with technical attacks to create sophisticated and destructive attack chains and shares some real world war stories.
Dan Guido talks about the current state of iOS attacks, reviews available security APIs, why they are not good enough, and the design of the Mobile Application Security Toolkit to address risks.
Ryan Huber talks about some of the ways Slack approaches collecting, inspecting, and communicating security information to the security team and to the individuals in their organization.
Zane Lackey discusses adapting security to change, building security programs, lessons learned from bug bounty programs, running attack simulations and knowing when security has been breached.
Olaf Carlson-Wee explores micropayment and wealth storage use cases for bitcoin and examines cryptosystems used to facilitate micro-penny payments and secure $B in global bitcoin banks.
Phil Nash takes a look at generating one time passwords, implementing two-factor authentication in web applications and the use cases for QR codes.
Jean Yang discusses research ideas to create secure software, what prevents them from becoming commercial solutions, and how the Cybersecurity Factory accelerator bridges the research/industry gap.
Brennan Saeta talks about aspects of Coursera’s architecture that enable them to rapidly build sophisticated features for their learning platform, the use of containers and security-related issues.
Maciej Maciejewski discusses persistent memory, storage devices, and DRAM, accessing persistent memory with ACPI 6.0 extensions, existing support in the Linux kernel and the NVM library.
CONTENT IN THIS BOX
PROVIDED BY OUR SPONSOR
Increase security on compromised platforms with Intel® SGX.
An Intel technology for application developers who are seeking to protect select code and data from disclosure or modification.
A Developer’s Perspective.
Developers have long been constrained by the security capabilities that major platform providers have exposed for application development. How Bromium and wolfSSL employ Intel® SGX to create more secure, next-generation solutions.
Learn more about the Intel SGX SDK, a collection of APIs, libraries, documentation, sample source code, and tools that allows software developers to create and debug Intel SGX enabled applications in C/C++.
Protect Application Code, Data, & Secrets from Attack.
Developers can partition their application into CPU hardened “enclaves” or protected areas of execution that increase security even on compromised platforms.
Intel Software Guard Extensions (SGX) for Dummies.
At its root, Intel® SGX is a set of new CPU instructions that can be used by applications to set aside private regions of code and data.