Intel Hardware CTF Competitions Drive Innovation for Next-Gen Secure Computing Platforms

The concept of capture the flag competitions goes back hundreds of years from a military perspective, and it has become a staple of hacking and cybersecurity exercises. The basic concept pits teams ...

Myth #1: Network Security Compliance Is Not All About Rules and Access Control

| | Security Research
This is part 1 of a 4-part series addressing compliance myths and what you need to know about uniting compliance and security in a hybrid environment People are confused about what compliance ...

USENIX Enigma 2020 – Mieke Eoyang’s ‘Cybercrime: Getting Beyond Analog Cops And Digital Robbers’

Many thanks to USENIX Enigma 2020 for publishing their outstanding USENIX Enigma 2020 Conference Videos. Enjoy! Permalink ...

USENIX Enigma 2020 – Eva Galperin’s ‘The State Of The Stalkerware’

Many thanks to USENIX Enigma 2020 for publishing their outstanding USENIX Enigma 2020 Conference Videos. Enjoy! Permalink ...

USENIX Enigma 2020 – Joey Dodds’ ‘Trustworthy Elections’

Many thanks to USENIX Enigma 2020 for publishing their outstanding USENIX Enigma 2020 Conference Videos. Enjoy! Permalink ...