Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store

Shows and Events

Shows and Events

Black Hat 2022, Def Con 30 and the Return to Vegas

After a three-year absence from Hacker Summer Camp, I finally returned to Vegas. Two of those years were related to Covid of course. However, three years is a long time to be out of the environment and the craziness that is both Black Hat and Def Con. To say I was excited to return to Vegas and everything that both cons have to offer would be an understatement. Both cons have their place in what I do here at DecryptedTech, but it was more than just the articles and conversations about security that I enjoy, it is getting to catch up with people I only see during the con and also the prospect of meeting new people and developing new relationships.

Details
By Sean Kalinich
Sean Kalinich
Aug 24
Hits: 1851
  • Security
  • Trade Shows
  • black hat 2022
  • def con 30

Read more: Black Hat 2022, Def Con 30 and the Return to Vegas

No comments on “Black Hat 2022, Def Con 30 and the Return to Vegas”
Shows and Events

Voice is an often overlooked big threat vector as phone fraud rises – part I

Def Con 25, Las Vegas, NV –
Your phone rings and you check the number as a precaution against marketing calls and it looks like it is from your office. The voice on the other end says that there is an issue on the network and they need your assistance to troubleshoot. The person is calm, friendly and helpful so you agree to assist. By the time it is all done you have in advertently given away vital information about your network to a potential attacker.

Details
By Sean Kalinich
Sean Kalinich
Aug 11
Hits: 10019
  • Hacking
  • Security
  • Social Engineering
  • DEF CON
  • Def Con 25
  • Social Engineering Village
  • Phone Fraud
  • Pindrop Security

Read more: Voice is an often overlooked big threat vector...

No comments on “Voice is an often overlooked big threat vector as phone fraud rises – part I”
Shows and Events

Illusive Networks says that deception everywhere is the way to go

Black Hat 2017, Las Vegas, NV -
When an attacker gains a foothold in a network the first thing they need to do is learn the lay of the land. They have done some research on the target to gather information about possible systems they might encounter. In reality, they do not truly know what is going on. They are likely to have hit an exposed system with little true access into the good parts of the network. They are going to need to check shares, network connections and also scrape memory for and stored credentials. With these in had they begin the process of moving around the network and building their map of the target environment.

Details
By Sean Kalinich
Sean Kalinich
Jul 30
Hits: 10277
  • Security
  • Black Hat
  • Deception
  • Black Hat 2017
  • Illusive Networks
  • Attackers

Read more: Illusive Networks says that deception everywhere...

No comments on “Illusive Networks says that deception everywhere is the way to go”
Shows and Events

CloudPassage Looks to secure your entire cloud infrastructure

Black Hat 2017, Las Vegas, NV -
The cloud has become one of those buzz words that people like to use when they want you to put your data or workloads on someone else’s computers and network. Amazon Web Services (AWS), Microsoft Azure, and some lesser known systems. The problem is that once you put your information into their network there is a lot that you have to do to ensure that your information or workloads are secure. Amazon, Microsoft and others are only going to take security so far for you and that leave you vulnerable.

Details
By Sean Kalinich
Sean Kalinich
Jul 30
Hits: 8978
  • Black Hat
  • Azure
  • Cloud
  • AWS
  • Black Hat 2017
  • CloudPassage
  • Cloud Security
  • Compliance

Read more: CloudPassage Looks to secure your entire cloud...

No comments on “CloudPassage Looks to secure your entire cloud infrastructure”
Shows and Events

Vera jumps into the document control market with both feet

Black Hat USA 2017 – Las Vegas, NV
Three years ago we talked with a company that had something of a change in thought process on how to protect your data. Instead of building bigger walls they wanted to make the items behind those walls unusable to anyone that did not actually have access to them. This year at Black Hat we have talked with multiple companies that have the same, or a similar idea. One of the companies we talked to about this is Vera. Vera is another in a growing group of companies that understand that the traditional security posture is just not enough.

Details
By Sean Kalinich
Sean Kalinich
Jul 28
Hits: 9778
  • Encryption
  • 2FA
  • Black Hat 2017
  • Document Control
  • Securtity
  • Vera

Read more: Vera jumps into the document control market with...

No comments on “Vera jumps into the document control market with both feet”

More Articles …

  1. Attivo Networks rolls in incident response and controls into their deception
  2. Dell talks security, document control, and air gapped networks at Black Hat 2017
  3. AMD Drops the Ryzen based Threadripper CPU on Computex
  4. Intel Launches the new X-Series at Computex 2017
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10

Page 1 of 10

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech