Parent directory/ | - | - |
All That Cybers Is Not War - SOURCE Security Conference Boston 2015.eng.srt | 146.7 KiB | 2020 Nov 20 14:06 |
All That Cybers Is Not War - SOURCE Security Conference Boston 2015.mp4 | 125.8 MiB | 2022 Jan 05 02:03 |
Andy Ellis - Cognitive Injection - SOURCE Security Conference Boston 2015.eng.srt | 76.0 KiB | 2020 Nov 20 14:08 |
Andy Ellis - Cognitive Injection - SOURCE Security Conference Boston 2015.mp4 | 58.8 MiB | 2022 Jan 05 02:03 |
Aqua Vitae The Water of Life - Martin McKeay - SOURCE Dublin 2015.mp4 | 59.7 MiB | 2022 Jan 05 02:03 |
Bob Rudis - Before and Beyond the Breach New Research in the 2015 DBIR.eng.srt | 118.2 KiB | 2020 Nov 20 14:06 |
Bob Rudis - Before and Beyond the Breach New Research in the 2015 DBIR.mp4 | 51.0 MiB | 2022 Jan 05 02:03 |
Bugged Files Is Your Document Telling on You - Daniel Crowley and Damon Smith.eng.srt | 73.7 KiB | 2020 Nov 20 14:05 |
Bugged Files Is Your Document Telling on You - Daniel Crowley and Damon Smith.mp4 | 44.5 MiB | 2022 Jan 05 02:03 |
Catherine Pearce - Multipath T***** Breaking Today’s Networks with Tomorrow’s Protocols.eng.srt | 56.5 KiB | 2020 Nov 20 14:06 |
Catherine Pearce - Multipath T***** Breaking Today’s Networks with Tomorrow’s Protocols.mp4 | 58.8 MiB | 2022 Jan 05 02:03 |
Chasing Uniqueness, Understanding Normal - Neil King - SOURCE Dublin 2015.mp4 | 62.9 MiB | 2022 Jan 05 02:03 |
Dakota Nelson - Monitoring Social Media in 5 Minutes a Week - SOURCE Security Conference.eng.srt | 51.0 KiB | 2020 Nov 20 14:15 |
Dakota Nelson - Monitoring Social Media in 5 Minutes a Week - SOURCE Security Conference.mp4 | 32.8 MiB | 2022 Jan 05 02:03 |
Dan Lambright - Penetration Testing in the Cloud - SOURCE Security Conference.eng.srt | 47.7 KiB | 2020 Nov 20 14:36 |
Dan Lambright - Penetration Testing in the Cloud - SOURCE Security Conference.mp4 | 36.1 MiB | 2022 Jan 05 02:03 |
Doug Wilson and Thomas Millar - Cyber Information Sharing a Means not an End.eng.srt | 84.9 KiB | 2020 Nov 20 14:07 |
Doug Wilson and Thomas Millar - Cyber Information Sharing a Means not an End.mp4 | 56.6 MiB | 2022 Jan 05 02:03 |
From Tech to Exec - Panel - SOURCE Security Conference Boston 2015.eng.srt | 75.8 KiB | 2020 Nov 20 14:07 |
From Tech to Exec - Panel - SOURCE Security Conference Boston 2015.mp4 | 58.9 MiB | 2022 Jan 05 02:03 |
Growing Up A Maturity Model and Roadmap for Vulnerability Management.eng.srt | 53.5 KiB | 2020 Nov 20 14:17 |
Growing Up A Maturity Model and Roadmap for Vulnerability Management.mp4 | 49.0 MiB | 2022 Jan 05 02:03 |
Guillaume Ross - iOS App Analytics VS Privacy An analysis of the use of analytics.eng.srt | 65.1 KiB | 2020 Nov 20 14:23 |
Guillaume Ross - iOS App Analytics VS Privacy An analysis of the use of analytics.mp4 | 33.6 MiB | 2022 Jan 05 02:03 |
Jared Carlson - A Swift Teardown - SOURCE Security Conference Boston 2015.mp4 | 30.7 MiB | 2022 Jan 05 02:03 |
Jason Syversen - Quantifying cyber attacks to optimize and assess your defense.eng.srt | 62.9 KiB | 2020 Nov 20 14:22 |
Jason Syversen - Quantifying cyber attacks to optimize and assess your defense.mp4 | 50.0 MiB | 2022 Jan 05 02:03 |
Jen Ellis - Hacking the Media for Fame and Profit - SOURCE Security Conference Boston 2015.eng.srt | 135.1 KiB | 2020 Nov 20 14:11 |
Jen Ellis - Hacking the Media for Fame and Profit - SOURCE Security Conference Boston 2015.mp4 | 75.8 MiB | 2022 Jan 05 02:03 |
Jeremiah O’Connor - Using NLP to detect phishing and APT CnC domains.eng.srt | 53.5 KiB | 2020 Nov 20 14:31 |
Jeremiah O’Connor - Using NLP to detect phishing and APT CnC domains.mp4 | 45.3 MiB | 2022 Jan 05 02:03 |
Jim Routh - KEYNOTE - SOURCE Security Conference Boston 2015.eng.srt | 85.8 KiB | 2020 Nov 20 14:25 |
Jim Routh - KEYNOTE - SOURCE Security Conference Boston 2015.mp4 | 78.6 MiB | 2022 Jan 05 02:03 |
Josh Pyorre - Protecting your cloud server with a cloud IDS - SOURCE Security Conference.eng.srt | 62.8 KiB | 2020 Nov 20 14:09 |
Josh Pyorre - Protecting your cloud server with a cloud IDS - SOURCE Security Conference.mp4 | 55.9 MiB | 2022 Jan 05 02:03 |
Maddi Wallach - Excavating for Empathy - SOURCE Security Conference Boston 2015.eng.srt | 56.5 KiB | 2020 Nov 20 14:08 |
Maddi Wallach - Excavating for Empathy - SOURCE Security Conference Boston 2015.mp4 | 86.8 MiB | 2022 Jan 05 02:03 |
Mark Ostrowski and Steven Baker - Evolution of Threat - SOURCE Security Conference.eng.srt | 72.2 KiB | 2020 Nov 20 14:39 |
Mark Ostrowski and Steven Baker - Evolution of Threat - SOURCE Security Conference.mp4 | 44.7 MiB | 2022 Jan 05 02:03 |
Matt Wood - Reactive JS Security Testing - Exploitation - SOURCE Security Conference.mp4 | 57.5 MiB | 2022 Jan 05 02:03 |
Michael Roytman - Who Watches the Watchers Metrics for Security Strategy.eng.srt | 93.6 KiB | 2020 Nov 20 14:09 |
Michael Roytman - Who Watches the Watchers Metrics for Security Strategy.mp4 | 50.0 MiB | 2022 Jan 05 02:03 |
Mike Murray - KEYNOTE - SOURCE Security Conference Boston 2015.eng.srt | 85.3 KiB | 2020 Nov 20 14:11 |
Mike Murray - KEYNOTE - SOURCE Security Conference Boston 2015.mp4 | 53.3 MiB | 2022 Jan 05 02:03 |
Paul Asadoorian - Embedded Insecurity Can We Fix The Internet of Evil Things.eng.srt | 72.5 KiB | 2020 Nov 20 14:18 |
Paul Asadoorian - Embedded Insecurity Can We Fix The Internet of Evil Things.mp4 | 55.6 MiB | 2022 Jan 05 01:59 |
Roy Wattanasin - Improving the State of Healthcare Information Security as a Security Investigator.eng.srt | 67.5 KiB | 2020 Nov 20 14:10 |
Roy Wattanasin - Improving the State of Healthcare Information Security as a Security Investigator.mp4 | 44.7 MiB | 2022 Jan 05 01:59 |
Salvador Grec - Defending the Enterprise with Evernote - SOURCE Security Conference Boston 2015.eng.srt | 58.7 KiB | 2020 Nov 20 14:29 |
Salvador Grec - Defending the Enterprise with Evernote - SOURCE Security Conference Boston 2015.mp4 | 40.0 MiB | 2022 Jan 05 01:59 |
Silas Cutler - Adversary Profile Gothic Panda - SOURCE Security Conference.eng.srt | 52.0 KiB | 2020 Nov 20 14:34 |
Silas Cutler - Adversary Profile Gothic Panda - SOURCE Security Conference.mp4 | 33.6 MiB | 2022 Jan 05 01:59 |
Stephanie Losi - Selling for Security Professionals - SOURCE Security Conference Boston 2015.eng.srt | 65.5 KiB | 2020 Nov 20 14:14 |
Stephanie Losi - Selling for Security Professionals - SOURCE Security Conference Boston 2015.mp4 | 44.5 MiB | 2022 Jan 05 01:59 |
Suzanne Schwartz - KEYNOTE - SOURCE Security Conference Boston 2015.eng.srt | 83.0 KiB | 2020 Nov 20 14:15 |
Suzanne Schwartz - KEYNOTE - SOURCE Security Conference Boston 2015.mp4 | 72.8 MiB | 2022 Jan 05 01:59 |
Wade Woolwine and Josh Feinblum - Getting the most from your managed security providers.eng.srt | 80.8 KiB | 2020 Nov 20 14:32 |
Wade Woolwine and Josh Feinblum - Getting the most from your managed security providers.mp4 | 46.2 MiB | 2022 Jan 05 01:59 |
Xiaoning Li - iROP Interesting ROP gadgets - SOURCE Security Conference.eng.srt | 54.9 KiB | 2020 Nov 20 14:37 |
Xiaoning Li - iROP Interesting ROP gadgets - SOURCE Security Conference.mp4 | 30.9 MiB | 2022 Jan 05 01:59 |