BT
You are now in FULL VIEW
CLOSE FULL VIEW

How to Backdoor Invulnerable Code
Recorded at:

| by Josh Schwartz Follow 0 Followers on Jun 29, 2017 |
45:49

Summary
Josh Schwartz takes a look at the real tactics, with examples, used to compromise and backdoor seemingly secure products by exploiting the humans and systems that create them.

Sponsored Content

Bio

Josh Schwartz is Director of Offensive Security at Salesforce. He leads the Red Team conducting high impact offensive security engagements and frequently creates propaganda memes.

Software is changing the world. QCon empowers software development by facilitating the spread of knowledge and innovation in the developer community. A practitioner-driven conference, QCon is designed for technical team leads, architects, engineering directors, and project managers who influence innovation in their teams.

Login to InfoQ to interact with what matters most to you.


Recover your password...

Follow

Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.

Like

More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.

Notifications

Stay up-to-date

Set up your notifications and don't miss out on content that matters to you

BT