SecTalks
Fear of security getting their way | Surviving the Security–Engineering Collision - SecTalks SYD0x61
0:26
SecTalks
The cost of a security incident | Surviving the Security–Engineering Collision - SecTalks SYD0x61
1:07
SecTalks
The priorities of developers | Surviving the Security–Engineering Collision -SecTalks SYD0x61 (97th)
1:53
SecTalks
Why aren't security experts engineers |Surviving the Security-Engineering Collision-SecTalks SYD0x61
1:19
SecTalks
Why do developers resist security | Surviving the Security–Engineering Collision - SecTalks SYD0x61
1:33
SecTalks
Different types of security culture | Surviving the Security–Engineering Collision -SecTalks SYD0x61
1:35
SecTalks
Shaping Good Security Culture | Surviving the Security–Engineering Collision-SecTalks SYD0x61 (97th)
1:01
SecTalks
Mapping your threat model | Surviving the Security–Engineering Collision - SecTalks SYD0x61 (97th)
1:18
SecTalks
Pros&Cons of security experts coding |Surviving the Security–Engineering Collision-SecTalks SYD0x61
1:07
SecTalks
Different Responses to Security | Surviving the Security-Engineering Collision-SecTalks SYD0x61
0:28
SecTalks
Dangers of Vibe Coding | Surviving the Security–Engineering Collision - SecTalks SYD0x61 (97th)
1:11
SecTalks
What Level of Security is Reasonable | Surviving the Security–Engineering Collision-SecTalks SYD0x61
2:05
SecTalks
Surviving the Security–Engineering Collision - SecTalks SYD0x61 (97th)
1:21:38
SecTalks
Quantifying Security Risk - Surviving the Security–Engineering Collision - SecTalks SYD0x61(97th)
1:06
SecTalks
Sheel Code with Stack Spoofing and Sleep Obfiscation - SecTalks SYD0x60
1:51
SecTalks
Malware and ShellCode - SecTalks SYD0x60
1:09
SecTalks
Evading Memory Scans - SecTalks SYD0x60
1:33
SecTalks
EDR Detection of Malware - SecTalks SYD0x60
1:06
SecTalks
Characteristics of Modern Malware - SecTalks SYD0x60
1:27
SecTalks
Staying Under the Radar- Evasion in Modern Malware - SecTalks SYD0x60 (96th) - Bharat Bharadwai
38:45
SecTalks
SecTalks SYD0x58 - Exploring Attack Surface Management using OSINT tools, LLMs, and Agentic AI
29:17
SecTalks
SecTalks SYD0x58 - Future Improvements
1:11
SecTalks
SecTalks SYD0x58 - Hurdles and Limitations
1:08
SecTalks
SecTalks SYD0x58 - Evaluating the Outputs
0:21
SecTalks
SecTalks SYD0x58 - Configuring the Tech Stack
1:52
SecTalks
SecTalks SYD0x58 - Attack Surface Management using OSINT, Gen AI, and AI Agents
1:45
SecTalks
AI, PenTesting, Cybersecurity jobs, Certification, XSS w/ Norman Yue - SecTalks Legends 0x00
1:20:29
SecTalks
Reverse engineering the right way #cybersecurity #reverseengineering
0:42
SecTalks
AI cannot build secure system, here is why #cybersecurity #ai
0:54
SecTalks
Cybersecurity is not a bachelor course #university #cybersecurity
0:56
SecTalks
PenTesting only 5% of what industry needs. Certs and Unis got it wrong #cybersecurity #certificate
0:59
SecTalks
The hard part of building cybersecurity non-profit community #cybersecurity #communitybuilding
0:34
SecTalks
Learn CTF without doing CTF! #ctf #cybersecurity #learning
0:34
SecTalks
What happened to Platypus Con #community #australia #cybersecurity
0:46
SecTalks
AI suck at reverse engineering #ai #reverseengineering
0:57
SecTalks
Is AI going to take our cybersecurity jobs away? #cybersecurity #ai
0:50
SecTalks
Cybersecurity is not a big deal, sad but true reality! #cybersecurity #important
1:00
SecTalks
Cybersecurity managers are incapable of making a sensible decision - Norman Yue
1:00
SecTalks
We have forgotten to have fun with cybersecurity/hacking - Norman Yue
0:51
SecTalks
PenTesting approach: Do the dumbest thing first - Norman Yue
1:01
SecTalks
PenTest frameworks kill the exploration - Norman Yue
1:01
SecTalks
I found XSS but I didn't even know what its called - Norman Yue
0:55
SecTalks
I liked tinkering and that's why - Norman Yue
0:40
SecTalks
The seL4 microkernel: Mathematical proof of security - SecTalks SYD0x40 (64th)
1:37:28
SecTalks
SecTalks SYD Ninja Night NN0x11 (12th) Online
1:12:17
SecTalks
Why election auditing matters in Australia - SecTalks SYD0x41 (65th)
1:10:07
SecTalks
SecTalks SYD Ninja Night NN0x0a (11th) Online
1:51:43
SecTalks
SecTalks SYD0x43 (62nd) - Whack-a-Meltdown: a Micro-Architectural Game
1:18:11
SecTalks
SecTalks SYD0x42 (61st) - Software Security in the Presence of Faults
2:22:08
SecTalks
SecTalks SYD Ninja Night NN0x09 (10th) Online
1:14:03
SecTalks
SecTalks SYD0x41 (60th) - CovidSafe App Security
50:36
SecTalks
SecTalks SYD0x40 (59th) - Container Runtime Security
1:29:33
SecTalks
SecTalks SYD0x39 (58th) - Forays into side channel
1:37:30
SecTalks
SecTalks SYD+HOB Ninja Night NN0x08 (9th) Online
1:32:27
SecTalks
SecTalks Sydney & Melbourne Live May 2020
1:38:40
SecTalks
SecTalks SYD Ninja Night NN0x07 (8th) Online
1:29:27
SecTalks
SecTalks SYD Ninja Night NN0x06 (7th) Online
1:28:08
SecTalks
SecTalks SYD 0x38 - Numeric Overflow: Secure Programming Workshop
1:19:10
SecTalks
SecTalks SYD Online Ninja Night NN0x05 (6th)
1:41:27
SecTalks
SecTalks SYD0x37 (55th) - Password Cracking in 2020 (or) why does this still work?
57:36
SecTalks
SecTalks SYD0x32 (50th) - Automotive Control Systems Security
1:11:45
SecTalks
SecTalks SYD0x2F (47th) - Licking Batteries
59:16