article thumbnail

AI and AI policy top the agenda at CILIP Supplier Forum

CILIP

In addition to the 'Developing your AI policy' workshop, case studies were presented from both sides of the sector, an employer and an educator.

article thumbnail

How to start your career in cyber security

IT Governance

There are tons of events across the UK each year , where you can listen to keynote presentations, take part in roundtables and workshops, and network. Find out more about the ISO27001 Certified ISMS Foundation Training Course >> The post How to start your career in cyber security appeared first on IT Governance Blog.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A case study on the use of iBeacon technology at a major theme park

CGI

A case study on the use of iBeacon technology at a major theme park. With the new app, context-based messages are automatically sent to everyone approaching the park with instructions how to get in as quickly as possible. A table of case study on the use of iBeacon technology at a major theme park. Special events.

article thumbnail

Boffins devise a new side-channel attack affecting all AMD CPUs

Security Affairs

Experts demonstrated their attack technique with multiple case studies in real-world scenarios. . The team also demonstrated also how to exfiltrate data from kernel memory using simple Spectre gadgets in the Linux kernel. They monitored kernel activity (e.g. Pierluigi Paganini. SecurityAffairs – hacking, cyber security).

article thumbnail

RSA Conference 2023: Meet Thales Where the World Talks Security!

Thales Cloud Protection & Licensing

You can experience customer and partner presentations and learn more from one-on-one conversations with Thales experts. By attending our live sessions at the Thales booth, you will learn how to: Discover and classify your data wherever it resides. Sarah will also present on FIDO2 Passkeys and the Future of Passwordless.

article thumbnail

NSA releases the source code of the GHIDRA reverse engineering framework

Security Affairs

The platform was presented at the RSA Conference in San Francisco on Tuesday by Rob Joyce, former head of the NSA’s elite hacking team and now White House cybersecurity coordinator, Joyce has presented the code-analysis suite, he remarked the absence of backdoors. There is no backdoor in Ghidra,” he announced.

article thumbnail

Attacking encrypted USB keys the hard(ware) way

Elie

In this talk, we will present our methodology to assess "secure" USB devices both from the software and the hardware perspectives. We will demonstrate how this methodology works in practice via a set of case-studies.