Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
10-04-SOURCE-DetectingPenTesters.pptx |
3.86MB |
400 Apps in 40 Days.mp4 |
54.62MB |
Aaron Katz - Pre-Conference Interview.eng.srt |
19.86KB |
Aaron Katz - Pre-Conference Interview.mp4 |
10.78MB |
A Brief History of Physical Security.mp4 |
39.76MB |
Achievement Unlocked - Designing a compelling security awareness program.mp4 |
42.04MB |
Adam Meyers - Reverse Engineering Broken Arrows.mp4 |
53.39MB |
Adam Meyers - Security Sucks.mp4 |
59.79MB |
Adobe_SOURCEBoston.pptx |
1.48MB |
Advanced Linux Firewalls.mp4 |
54.82MB |
Advanced SQL Injection with SQLol - The Configurable SQLi Testbed.mp4 |
43.48MB |
Adversarial Resilience at the Planetary Scale.mp4 |
44.44MB |
Allison Miller - Protecting Customers from Online Threats.mp4 |
65.00MB |
All That Cybers Is Not War - SOURCE Security Conference Boston 2015.eng.srt |
146.70KB |
All That Cybers Is Not War - SOURCE Security Conference Boston 2015.mp4 |
125.78MB |
All the Data That s Fit to Visualize.mp4 |
46.15MB |
Amirali Sanatinia - SOURCE Mesa Pre-Conference Interview.eng.srt |
14.79KB |
Amirali Sanatinia - SOURCE Mesa Pre-Conference Interview.mp4 |
12.03MB |
Analysis of The BroBot DDOS Attack.mp4 |
50.77MB |
Analyzing the Chemistry of Data.mp4 |
46.13MB |
Anand Srinivas - Speaker Interview - Source Boston 2019.eng.srt |
30.88KB |
Anand Srinivas - Speaker Interview - Source Boston 2019.mp4 |
17.10MB |
Andrea Little Limbago - Speaker Interview - Source Boston 2019.mp4 |
7.16MB |
Android Modding for the Security Practitioner.mp4 |
42.55MB |
Andy Ellis - Cognitive Injection - SOURCE Security Conference Boston 2015.eng.srt |
75.97KB |
Andy Ellis - Cognitive Injection - SOURCE Security Conference Boston 2015.mp4 |
58.77MB |
Andy Purdy - Keynote.mp4 |
92.48MB |
Anti-Debugging - A Developer s Viewpoint.mp4 |
58.70MB |
Anti-Virus Product Testing Sessions.mp4 |
75.69MB |
Anurag Dwivedy - Pre-Conference Interview.eng.srt |
14.89KB |
Anurag Dwivedy - Pre-Conference Interview.mp4 |
13.25MB |
Applied Threat Modeling - Live.mp4 |
65.72MB |
Aqua Vitae The Water of Life - Martin McKeay - SOURCE Dublin 2015.mp4 |
59.73MB |
A Security Metric for Software Developer.mp4 |
38.98MB |
Attacking Cloud Services with Source Code.mp4 |
46.30MB |
Attacking Cloud Services with Source Code (2).mp4 |
46.01MB |
Attacking Layer 8 - Client Side Penetration Testing.mp4 |
45.85MB |
Automated Structural Malware Classification.mp4 |
58.65MB |
A Virtualization and Cloud Computing Security Fable Set To Interpretive Dance.mp4 |
73.79MB |
Avoiding Android App Security Pitfalls.mp4 |
43.78MB |
Balancing the Pwn Trade Deficit.mp4 |
47.28MB |
Banking on education - A case study on security training programs.mp4 |
62.35MB |
Behind The Scenes - Pwning Satellite Cable TV.mp4 |
39.95MB |
Big Data Big Liability.mp4 |
40.75MB |
BillBlunden.pdf |
2.22MB |
Bill Blunden - An Uninvited Guest.mp4 |
81.64MB |
Birds, bots and machines - Fraud in Twitter and how to detect it using Machine Learning Techniques.mp4 |
47.85MB |
Blitzing with your Defense.mp4 |
52.46MB |
Bob Adams - SOURCE Pre-Conference Interview.eng.srt |
20.46KB |
Bob Adams - SOURCE Pre-Conference Interview.mp4 |
13.19MB |
Bob Rudis - Before and Beyond the Breach New Research in the 2015 DBIR.eng.srt |
118.21KB |
Bob Rudis - Before and Beyond the Breach New Research in the 2015 DBIR.mp4 |
51.01MB |
Brian Holyfield - Cracking the Foundation.mp4 |
66.36MB |
Brianne Hughes - SOURCE Pre-Conference Interviews.eng.srt |
13.37KB |
Brianne Hughes - SOURCE Pre-Conference Interviews.mp4 |
10.77MB |
Bring Your Own Device - Keeping it Simple and Effective.mp4 |
52.10MB |
Broken Arrows Source.pdf |
1.92MB |
Browser Extensions - The Backdoor To Stealth Malware.mp4 |
54.11MB |
Brueggemann.pptx |
1.13MB |
BugCrowd - Speaker Interview - Source Boston 2019.eng.srt |
37.79KB |
BugCrowd - Speaker Interview - Source Boston 2019.mp4 |
18.31MB |
Bugged Files Is Your Document Telling on You - Daniel Crowley and Damon Smith.eng.srt |
73.74KB |
Bugged Files Is Your Document Telling on You - Daniel Crowley and Damon Smith.mp4 |
44.53MB |
Building Bridges - Forcing Hackers and Business to - Hug it Out.mp4 |
43.35MB |
Building Dictionaries And Destroying Hashes Using Amazon EC2.mp4 |
53.18MB |
Building Your Own Packet Capture Platform.mp4 |
59.77MB |
Business Logic Flaws.mp4 |
50.11MB |
BYOD - The Risks, Rewards and Challenges.mp4 |
36.68MB |
Carders.cc, the Rise and Fall of an Underground Forum.mp4 |
56.72MB |
Career Management Workshop (part 1).mp4 |
81.89MB |
Career Management Workshop (part 2).mp4 |
96.13MB |
carmen.pdf |
3.69MB |
Carole Fennelly - Vulnerability Management Panel.mp4 |
62.93MB |
Caroline Wong - SOURCE Mesa Pre-Conference Interview.eng.srt |
23.23KB |
Caroline Wong - SOURCE Mesa Pre-Conference Interview.mp4 |
21.61MB |
Catherine Pearce - Multipath TCP Breaking Today’s Networks with Tomorrow’s Protocols.eng.srt |
56.46KB |
Catherine Pearce - Multipath TCP Breaking Today’s Networks with Tomorrow’s Protocols.mp4 |
58.81MB |
Celebrating Bad Crypto.mp4 |
43.15MB |
CEO Panel.mp4 |
44.52MB |
Chasing Uniqueness, Understanding Normal - Neil King - SOURCE Dublin 2015.mp4 |
62.92MB |
Chris Clark and Townsend Ladd Harris - Attacking WebOS.mp4 |
71.25MB |
Chris Cornutt - Speaker Interview - SOURCE Austin.eng.srt |
22.14KB |
Chris Cornutt - Speaker Interview - SOURCE Austin.mp4 |
11.00MB |
Chris Hoff - Cloudiforniturtles.mp4 |
69.84MB |
Chris Romeo - SOURCE Mesa- Phoenix Conference Speaker.mp4 |
20.29MB |
Chris Wysopal - We See The Future And Its Not Pretty - SOURCE Security Conference.eng.srt |
63.58KB |
Chris Wysopal - We See The Future And Its Not Pretty - SOURCE Security Conference.mp4 |
50.61MB |
ColdFusion for Penetration Testers.mp4 |
35.62MB |
Colin Ames - Neurosurgery With Meterpreter.mp4 |
43.86MB |
Content Awareness - A Cornerstone to Data Prote.mp4 |
53.49MB |
Covering your - aaS - Cloud Security Case Studies for SaaS, PaaS, and IaaS.mp4 |
39.71MB |
Criticality, Rejectionists, Risk Tolerance - Keynote at Source Boston 2012.mp4 |
44.89MB |
Cyber[Crime War] - Connecting the Dots.mp4 |
52.44MB |
Dakota Nelson - Monitoring Social Media in 5 Minutes a Week - SOURCE Security Conference.eng.srt |
50.98KB |
Dakota Nelson - Monitoring Social Media in 5 Minutes a Week - SOURCE Security Conference.mp4 |
32.82MB |
Dan Cornell - Pre-Conference Interview - SOURCE Austin.mp4 |
12.42MB |
Dan Crowley - Windows File Pseudonyms.mp4 |
54.63MB |
DanK.pptx |
765.16KB |
Dan Lambright - Penetration Testing in the Cloud - SOURCE Security Conference.eng.srt |
47.70KB |
Dan Lambright - Penetration Testing in the Cloud - SOURCE Security Conference.mp4 |
36.14MB |
Data Breach - Let The Finger Pointing Begin.mp4 |
57.85MB |
David Mortman - Too Many Cooks Spoil the Broth.mp4 |
65.05MB |
De-constructing the Cost of a Data Breach.mp4 |
36.10MB |
Deidre Diamond - Pre- conference Interview.mp4 |
15.81MB |
Deperimetrisation - Dream Or Nightmare For Network Security.mp4 |
71.81MB |
Detailed Thread Modeling.mp4 |
56.99MB |
Developing an Incident Response Plan.mp4 |
62.05MB |
Deviant Ollam - The Four Types of Locks.mp4 |
81.54MB |
Dino.pdf |
1.71MB |
Dino Dai Zovi - Practical Return-Oriented Programming.mp4 |
77.39MB |
Disruptive Innovation and the Future of Security.mp4 |
61.95MB |
Dissecting Foreign Web Attacks.mp4 |
51.15MB |
Distributed Security - Expanding the Toolkit for Institutional Resilience.mp4 |
54.19MB |
Doug Wilson and Thomas Millar - Cyber Information Sharing a Means not an End.eng.srt |
84.88KB |
Doug Wilson and Thomas Millar - Cyber Information Sharing a Means not an End.mp4 |
56.55MB |
Dov Yoran and Chris Hoff - Cloud Security.mp4 |
61.15MB |
Dr. David Rees & Karthik Raman - Why Developers And Vulnerability Researchers Should Collaborate.eng.srt |
87.03KB |
Dr. David Rees & Karthik Raman - Why Developers And Vulnerability Researchers Should Collaborate.mp4 |
45.31MB |
Employing PCI Compliance Programs.mp4 |
54.45MB |
Encryption and Enterprise Data Security.mp4 |
55.75MB |
Entrepreneur Panel.mp4 |
60.31MB |
Erez Metula - Managed Code Rootkits.mp4 |
58.06MB |
ERP Security - Myths, Problems, Solutions.mp4 |
71.05MB |
Establishing a Security Metrics Program.mp4 |
49.03MB |
Exploiting Unicode-enable Software.mp4 |
49.71MB |
Facilitating Fluffy Forensics (a.k.a. Considerations for Cloud Forensics).mp4 |
54.09MB |
Finding the Weak Link in Windows Binaries.mp4 |
36.20MB |
From Tech to Exec - Panel - SOURCE Security Conference Boston 2015.eng.srt |
75.83KB |
From Tech to Exec - Panel - SOURCE Security Conference Boston 2015.mp4 |
58.87MB |
From The Garage To NASDAQ With Open Source - The Sourcefire Experience.mp4 |
63.50MB |
Games We Play - Defenses and Disincentives.mp4 |
56.75MB |
Games We Play - Payoffs & Chaos Monkeys.mp4 |
37.55MB |
Garett Montgomery - Pre-Conference Interview - SOURCE Austin.eng.srt |
13.72KB |
Garett Montgomery - Pre-Conference Interview - SOURCE Austin.mp4 |
7.23MB |
Georgia Weidman - SOURCE Boston Pre-Conference Interview.eng.srt |
17.26KB |
Georgia Weidman - SOURCE Boston Pre-Conference Interview.mp4 |
13.05MB |
Get Rich or Die Trying - - Making Money on the Web the Black Hat Way.mp4 |
56.04MB |
Growing Up A Maturity Model and Roadmap for Vulnerability Management.eng.srt |
53.50KB |
Growing Up A Maturity Model and Roadmap for Vulnerability Management.mp4 |
48.99MB |
Guillaume Ross - iOS App Analytics VS Privacy An analysis of the use of analytics.eng.srt |
65.11KB |
Guillaume Ross - iOS App Analytics VS Privacy An analysis of the use of analytics.mp4 |
33.58MB |
Hacking Back - is a Bad Idea.mp4 |
33.96MB |
Hacking SAP BusinessObjects.mp4 |
30.36MB |
Harry Sverdlove - Speaker Interview - SOURCE Austin.eng.srt |
16.89KB |
Harry Sverdlove - Speaker Interview - SOURCE Austin.mp4 |
7.61MB |
Having a Defined Target for Software Security Testing.mp4 |
43.10MB |
Haydn Johnson.eng.srt |
19.88KB |
Haydn Johnson.mp4 |
17.21MB |
HDKeynote.pdf |
5.07MB |
HD Moore - Keynote.mp4 |
70.35MB |
HD Moore - Making Penetration Testing Mainstream.mp4 |
84.69MB |
Hiring Recruitment.mp4 |
85.25MB |
Horseless Carriage Exploits and Eavesdropping Defenses.mp4 |
106.73MB |
How Compliance Can Get You Killed.mp4 |
57.64MB |
How Microsoft Fixes Security Vulnerabilities.mp4 |
57.53MB |
How to Respond to an Unexpected Security Incident - A Reality Check.mp4 |
44.79MB |
I Can Haz Privacy.mp4 |
49.98MB |
If Black Hats always win, why is Albert Gonzalez in prison.mp4 |
47.71MB |
Implementing a CSIRT - Lessons Learnt from Setting Up the Irish CERT.mp4 |
84.21MB |
Information Operations.mp4 |
44.92MB |
Information Security in Higher Education - Baby Steps.mp4 |
54.43MB |
Insider Threat - Hunting for Authorized Evil.mp4 |
51.74MB |
Inside the Black Hole Exploit Kit (BHEK).mp4 |
51.38MB |
Inside the Duqu Command and Control Servers,.mp4 |
47.94MB |
Interview With Security Innovations Joe Basirico - Security Innovation.eng.srt |
30.65KB |
Interview With Security Innovations Joe Basirico - Security Innovation.mp4 |
38.77MB |
Introducing Heyoka - DNS Tunneling 2.0.mp4 |
48.32MB |
Investigation Techniques for Social Networking Sites.mp4 |
58.15MB |
iSEC_Securely_Moving_Into_The_Cloud.pdf |
633.64KB |
It isn’t all foggy in the Cloud Digital Forensic Investigations in the Cloud Environment.mp4 |
52.72MB |
Izar Tarandach - Speaker Interview - Source Boston 2019.eng.srt |
15.06KB |
Izar Tarandach - Speaker Interview - Source Boston 2019.mp4 |
8.69MB |
Jackpotting Automated Teller Machines.mp4 |
84.48MB |
Jake Appelbaum - Anonymity, Privacy, and Cirvumvention with Tor.mp4 |
87.84MB |
Jared Carlson - A Swift Teardown - SOURCE Security Conference Boston 2015.mp4 |
30.72MB |
Jason Bubolz & Rachel Engel - Unified Communications Information Loss Through the Front Door.eng.srt |
105.06KB |
Jason Bubolz & Rachel Engel - Unified Communications Information Loss Through the Front Door.mp4 |
53.83MB |
Jason Hoenich - Pre-Conference Interview.eng.srt |
37.56KB |
Jason Hoenich - Pre-Conference Interview.mp4 |
24.71MB |
Jason Syversen - Quantifying cyber attacks to optimize and assess your defense.eng.srt |
62.89KB |
Jason Syversen - Quantifying cyber attacks to optimize and assess your defense.mp4 |
49.98MB |
JavaScript Pitfalls.mp4 |
54.77MB |
Jen Ellis - Hacking the Media for Fame and Profit - SOURCE Security Conference Boston 2015.eng.srt |
135.12KB |
Jen Ellis - Hacking the Media for Fame and Profit - SOURCE Security Conference Boston 2015.mp4 |
75.80MB |
Jeremiah O’Connor - Using NLP to detect phishing and APT CnC domains.eng.srt |
53.54KB |
Jeremiah O’Connor - Using NLP to detect phishing and APT CnC domains.mp4 |
45.34MB |
Jim Routh - KEYNOTE - SOURCE Security Conference Boston 2015.eng.srt |
85.82KB |
Jim Routh - KEYNOTE - SOURCE Security Conference Boston 2015.mp4 |
78.61MB |
Joe Gray - SOURCE Pre-Conference Interview.mp4 |
19.18MB |
Joel Scambray NCC Group - SOURCE Mesa Interview.mp4 |
10.79MB |
John Cran - Realities of Starting a Security Company - Entrepreneurs Panel.mp4 |
68.73MB |
Jonathan Cran - Pwnie Express presents Practical MitM Pentesting - SOURCE Security Conference.eng.srt |
47.75KB |
Jonathan Cran - Pwnie Express presents Practical MitM Pentesting - SOURCE Security Conference.mp4 |
41.53MB |
Jon Oberheide - Linux Kernel Exploitation.mp4 |
37.16MB |
Josh Bressers - Pre-Conference Interview - SOURCE Austin.eng.srt |
25.72KB |
Josh Bressers - Pre-Conference Interview - SOURCE Austin.mp4 |
11.52MB |
Josh Corman - Realities of Starting a Security Company - Investors Panel.mp4 |
76.15MB |
Josh Corman - Rugged Software.mp4 |
67.82MB |
Josh Pyorre - Protecting your cloud server with a cloud IDS - SOURCE Security Conference.eng.srt |
62.75KB |
Josh Pyorre - Protecting your cloud server with a cloud IDS - SOURCE Security Conference.mp4 |
55.92MB |
Julien Sobrier - Browser Extensions The Backdoor To Stealth Malware - SOURCE Security Conference.eng.srt |
87.39KB |
Julien Sobrier - Browser Extensions The Backdoor To Stealth Malware - SOURCE Security Conference.mp4 |
48.66MB |
Just Another Day at the Office... September 11, 2001, The White House.mp4 |
39.75MB |
Justine Bone - Pre-Conference Interview.eng.srt |
9.12KB |
Justine Bone - Pre-Conference Interview.mp4 |
16.71MB |
Katy Anton - Speaker Interview - Source Boston 2019.mp4 |
12.54MB |
Kevin Babcock - SOURCE Mesa Pre Conference Interview.eng.srt |
17.13KB |
Kevin Babcock - SOURCE Mesa Pre Conference Interview.mp4 |
12.49MB |
Keynote - Andy Ellis.mp4 |
63.20MB |
Keynote - Dan Geer.mp4 |
46.84MB |
Keynote - Dan Geer & Richard Thieme.mp4 |
54.85MB |
Keynote - Gene Kim.mp4 |
35.80MB |
Keynote Speaker - Richard Clarke.mp4 |
39.52MB |
Keynote - Steven Levy.mp4 |
48.67MB |
L0phtCrack 6 Release.mp4 |
51.22MB |
L0pht Panel.mp4 |
61.29MB |
Lenny Zeltser - Knock Knock.mp4 |
60.33MB |
Lessons Of Binary Analysis.mp4 |
108.16MB |
Lessons Of Static Binary Analysis.mp4 |
52.47MB |
Lessons of the Kobayashi Maru - If You re Not Cheating, You re Not Trying.mp4 |
38.57MB |
Lester Godsey - SOURCE Mesa Interview.eng.srt |
19.90KB |
Lester Godsey - SOURCE Mesa Interview.mp4 |
11.45MB |
Leveraging Collective Intelligence To Combat Cyber Crime.mp4 |
81.41MB |
Leveraging Collective Intelligence To Combat Cyber Crime - PANEL - SOURCE Security Conference.eng.srt |
159.22KB |
Leveraging Collective Intelligence To Combat Cyber Crime - PANEL - SOURCE Security Conference.mp4 |
88.71MB |
Leveraging Social Networking While Mitigating Risk.mp4 |
38.33MB |
Maddi Wallach - Excavating for Empathy - SOURCE Security Conference Boston 2015.eng.srt |
56.46KB |
Maddi Wallach - Excavating for Empathy - SOURCE Security Conference Boston 2015.mp4 |
86.80MB |
Managed Code Rootkits - Erez Metula.ppt |
2.34MB |
Managing Your Career in Infosec.mp4 |
59.38MB |
Mapping And Evolution Of Android Permissions.mp4 |
42.25MB |
Marcus Carey - Speaker Interview - SOURCE Austin.mp4 |
6.02MB |
Marcus Ranum Keynote.mp4 |
62.09MB |
Mark Ostrowski and Steven Baker - Evolution of Threat - SOURCE Security Conference.eng.srt |
72.17KB |
Mark Ostrowski and Steven Baker - Evolution of Threat - SOURCE Security Conference.mp4 |
44.71MB |
Mary Ann Davidson - Keynote.mp4 |
77.10MB |
Masha Sedova - SOURCE Boston Pre-Conference Interview.eng.srt |
31.21KB |
Masha Sedova - SOURCE Boston Pre-Conference Interview.mp4 |
24.24MB |
Massachusetts Data Breach Laws, Regulations, and Responsibilities.mp4 |
32.16MB |
Master Class InfoSec Train the Trainer.mp4 |
6.48MB |
Matthew Cheung - SOURCE Pre-Conference Interview.mp4 |
10.50MB |
Matt Wood - Reactive JS Security Testing - Exploitation - SOURCE Security Conference.mp4 |
57.55MB |
Maximizing ROI on Vulnerability Management.mp4 |
45.00MB |
Media Hype in the Information Security Industry.mp4 |
35.28MB |
Megan Roddie - Pre-Conference Interview - SOURCE Austin.eng.srt |
28.59KB |
Megan Roddie - Pre-Conference Interview - SOURCE Austin.mp4 |
15.64MB |
Megan Roddie - SOURCE Mesa Pre-Conference Interview.eng.srt |
18.68KB |
Megan Roddie - SOURCE Mesa Pre-Conference Interview.mp4 |
18.21MB |
Michael Borohovski - Speaker Interview - SOURCE Austin.mp4 |
11.68MB |
Michael Roytman - Who Watches the Watchers Metrics for Security Strategy.eng.srt |
93.62KB |
Michael Roytman - Who Watches the Watchers Metrics for Security Strategy.mp4 |
49.97MB |
Microsoft s Response Process - 10 Years of Hard Knock Learning.mp4 |
54.98MB |
Mike Kershaw - Wifi Security.mp4 |
59.82MB |
Mike Murray - KEYNOTE - SOURCE Security Conference Boston 2015.eng.srt |
85.33KB |
Mike Murray - KEYNOTE - SOURCE Security Conference Boston 2015.mp4 |
53.35MB |
Mike Murray - Pre-Conference Interview - SOURCE Austin.eng.srt |
26.49KB |
Mike Murray - Pre-Conference Interview - SOURCE Austin.mp4 |
12.74MB |
Ming Fu - Pre-Conference Interview.eng.srt |
28.87KB |
Ming Fu - Pre-Conference Interview.mp4 |
25.53MB |
Mobile Snitch - Devices telling the world about you.mp4 |
37.78MB |
MonkeyBerries-SourceBoston-2010.pdf |
1.54MB |
Moxie.pdf |
4.32MB |
Moxie Marlinspike - Changing Threats to Privacy.mp4 |
86.88MB |
Nathan Cooprider - SOURCE Mesa Pre-Conference Interview.mp4 |
18.96MB |
No one is coming. We are the Cavalry - Claus Haumann - SOURCE Dublin 2015.mp4 |
88.18MB |
Not Dead But Twitching - Anti-Virus Succumbs to the Scourge of Modern Malware.mp4 |
58.88MB |
No Victims - How to Measure & Communicate Risk.mp4 |
48.60MB |
NSSLabs - SourceBoston.ppt |
2.10MB |
NT Object (In)Security.pdf |
599.30KB |
Ofer Shezaf - RESTful Services, The Web Security Blind Spot - SOURCE Security Conference.eng.srt |
86.29KB |
Ofer Shezaf - RESTful Services, The Web Security Blind Spot - SOURCE Security Conference.mp4 |
53.85MB |
Panel Discussion - 2009 And Beyond.mp4 |
55.92MB |
Panel Discussion - The tug-o-war between business and security.mp4 |
50.59MB |
Panel - The Partial Disclosure Dilemma.mp4 |
96.92MB |
Passwords in Corporate Networks.mp4 |
62.81MB |
Paul Asadoorian - Embedded Insecurity Can We Fix The Internet of Evil Things.eng.srt |
72.50KB |
Paul Asadoorian - Embedded Insecurity Can We Fix The Internet of Evil Things.mp4 |
55.63MB |
Paul Asadoorian - Embedded System Hacking.mp4 |
73.80MB |
Paul Asadoorian - SOURCE Boston Pre-Conference Interview.eng.srt |
21.87KB |
Paul Asadoorian - SOURCE Boston Pre-Conference Interview.mp4 |
17.53MB |
PCI-right_wrong_2010-04-22.pdf |
1.08MB |
Personal Message From Our Executive Director.eng.srt |
11.77KB |
Personal Message From Our Executive Director.mp4 |
6.31MB |
Perspectives of How to Develop a Winning Career in Infosec.mp4 |
36.01MB |
Peter Kuper - Keynote.mp4 |
53.97MB |
Phillip Maddux - SOURCE Pre-Conference Interview.eng.srt |
17.19KB |
Phillip Maddux - SOURCE Pre-Conference Interview.mp4 |
14.34MB |
PLC SCADA Vulnerabilities in Correctional Facilities.mp4 |
53.18MB |
Practical Exploitation of Embedded Systems.mp4 |
49.79MB |
Privacy at the Border - A Guide for Traveling with Devices.mp4 |
54.20MB |
Proactive Defense.mp4 |
44.23MB |
Protecting sensitive information on iOS devices.mp4 |
51.00MB |
Protecting Vulnerable Web Applications With IIS7.mp4 |
58.88MB |
Pwnie Express presents Practical MitM Pentesting.mp4 |
44.55MB |
Rafal Los and Matt Wood - Into the Rabbit Hole.mp4 |
84.83MB |
Rafal Los - SOURCE Mesa Speaker Interview.mp4 |
29.61MB |
Randolph Barr - Gain Comfort in Losing Control to the Cloud.mp4 |
58.39MB |
RandyBarr.pptx |
1.71MB |
RESTful Services, The Web Security Blind Spot.mp4 |
48.77MB |
Reverse Engineering Mobile Applications.mp4 |
49.29MB |
Revolution or Evolution - Information Security 2020.mp4 |
35.08MB |
Richard Stiennon - Speaker Interview - Source Boston 2019.eng.srt |
35.33KB |
Richard Stiennon - Speaker Interview - Source Boston 2019.mp4 |
31.87MB |
Richard Thieme - Speaker Interview - SOURCE Austin 2018.eng.srt |
34.59KB |
Richard Thieme - Speaker Interview - SOURCE Austin 2018.mp4 |
19.71MB |
Rich Mogull - Involuntary Case Studies in Data Breaches.mp4 |
89.54MB |
Riley Hassell - NT Object Insecurity.mp4 |
57.04MB |
Rise In ATM Compromises.mp4 |
44.88MB |
Robert Clark.ppt |
315.00KB |
Robert Clark - Legal Aspects of Computer Network Security and Privacy.mp4 |
75.00MB |
Robert Lee - The Interim Years Of Cyberspace Security In A Domain Of Warfare.eng.srt |
97.21KB |
Robert Lee - The Interim Years Of Cyberspace Security In A Domain Of Warfare.mp4 |
43.50MB |
Robert Sell - SOURCE Mesa Pre-Conference Interview.mp4 |
16.60MB |
Rocio Baeza - SOURCE Mesa Speaker Interview.mp4 |
17.43MB |
Rodrigo Montoro - Scoring PDF Structure To Detect Malicious Files - SOURCE Security Conference.eng.srt |
58.45KB |
Rodrigo Montoro - Scoring PDF Structure To Detect Malicious Files - SOURCE Security Conference.mp4 |
37.14MB |
Ron Gula - Detecting Penetration Testing.mp4 |
62.46MB |
Roxy Dee - SOURCE Mesa 2018 Interview.eng.srt |
15.88KB |
Roxy Dee - SOURCE Mesa 2018 Interview.mp4 |
10.35MB |
Roy Wattanasin - Improving the State of Healthcare Information Security as a Security Investigator.eng.srt |
67.52KB |
Roy Wattanasin - Improving the State of Healthcare Information Security as a Security Investigator.mp4 |
44.73MB |
Rugged Software Development_20100311(2).pdf |
7.49MB |
Salvador Grec - Defending the Enterprise with Evernote - SOURCE Security Conference Boston 2015.eng.srt |
58.67KB |
Salvador Grec - Defending the Enterprise with Evernote - SOURCE Security Conference Boston 2015.mp4 |
40.05MB |
Sandy Carielli - Pre-Conference Interview.mp4 |
11.30MB |
sb2010-schedule.htm |
142.40KB |
SCAP for Everyone - A case study in transforming configurations.mp4 |
53.84MB |
SCCP hacking Attacking the SS7 & SIGTRAN and Mapping the Phone System.mp4 |
72.80MB |
Scoring PDF Structure To Detect Malicious Files.mp4 |
33.56MB |
Secure Voice Communications - The Missing Piece in Mobile Security.mp4 |
54.22MB |
Security in Agile PLC - Practical navigational aid for speed boats.mp4 |
42.01MB |
Security in the SDLC - IT Doesn t Have To Be Painful.mp4 |
74.79MB |
Security Start-Up Event (showcase).mp4 |
54.18MB |
Security Startup Showcase.mp4 |
51.94MB |
Security Sucks.mp4 |
35.92MB |
SexyDefense - Maximizing the home-field advantage.mp4 |
49.91MB |
Silas Cutler - Adversary Profile Gothic Panda - SOURCE Security Conference.eng.srt |
51.96KB |
Silas Cutler - Adversary Profile Gothic Panda - SOURCE Security Conference.mp4 |
33.57MB |
source10-linuxkernel-jonoberheide.pdf |
874.75KB |
SOURCE-Boston-2010.pdf |
2.85MB |
SOURCE Boston 2010 Clark slides.ppt |
313.00KB |
SOURCE Boston 2012 - Keynote - Anonymous 20 20 - The Beginning is Near.mp4 |
48.59MB |
Source logo.jpg |
24.23KB |
SOURCE thank you.txt |
765B |
So You Want To Train An Army Of Ninjas.mp4 |
49.24MB |
Splunk.mp4 |
54.06MB |
Stacy Thayer - Pre-Conference Interview - SOURCE Austin.eng.srt |
36.97KB |
Stacy Thayer - Pre-Conference Interview - SOURCE Austin.mp4 |
19.36MB |
Stephanie Losi - Selling for Security Professionals - SOURCE Security Conference Boston 2015.eng.srt |
65.48KB |
Stephanie Losi - Selling for Security Professionals - SOURCE Security Conference Boston 2015.mp4 |
44.54MB |
SteveChristey.pptx |
1.25MB |
Steve Werby & Randy Todd - Building Dictionaries And Destroying Hashes Using Amazon EC2.eng.srt |
101.33KB |
Steve Werby & Randy Todd - Building Dictionaries And Destroying Hashes Using Amazon EC2.mp4 |
49.68MB |
Strategic Analysis of the iOS Jailbreak Development Community.mp4 |
42.26MB |
Successful Application Security Programs in an Uncertain Landscape.mp4 |
42.88MB |
Suicide Risk Assessment and Intervention Tactics.mp4 |
53.46MB |
Supplier Security Risk Assessment A Practical Guide - Marian Ventuneac.mp4 |
54.38MB |
Suzanne Schwartz - KEYNOTE - SOURCE Security Conference Boston 2015.eng.srt |
82.96KB |
Suzanne Schwartz - KEYNOTE - SOURCE Security Conference Boston 2015.mp4 |
72.75MB |
Swapnil Deshmukh - SOURCE Mesa 2018 Interviews.eng.srt |
14.92KB |
Swapnil Deshmukh - SOURCE Mesa 2018 Interviews.mp4 |
14.97MB |
Telephone Defenses Against the Dark Arts (part1).mp4 |
113.26MB |
Tenable Network Security.mp4 |
52.79MB |
The Base Rate Fallacy - Information Security Needs To Understand This..mp4 |
50.08MB |
The CERT C Secure Coding Standard.mp4 |
60.95MB |
The Crisis in Information Security.mp4 |
58.33MB |
The Interim Years Of Cyberspace - Security In A Domain Of Warfare.mp4 |
45.90MB |
Theory and Application of Realistic Capture the Flag Competitions.mp4 |
45.91MB |
Thomas Fischer - SOURCE Boston Pre-Conference Interview.eng.srt |
29.45KB |
Thomas Fischer - SOURCE Boston Pre-Conference Interview.mp4 |
20.97MB |
Timothy Brueggemann - Understanding The Key to Protecting Highly Sensitive PII.mp4 |
56.27MB |
Tony Rucci - Just Another Day at the Office September 11, 2001, The White House.eng.srt |
85.59KB |
Tony Rucci - Just Another Day at the Office September 11, 2001, The White House.mp4 |
45.77MB |
Travis Goodspeed - Breaking Zigbee Crypto.mp4 |
60.89MB |
Trend Micro - Measuring Security.mp4 |
121.21MB |
Turning Science into Sound Bites - Lessons from - Prototype This.mp4 |
52.86MB |
Understanding and Preventing Data Breaches, The Real World Edition.mp4 |
38.48MB |
Understanding Emerging Threats - The case of Nugache.mp4 |
56.60MB |
Unified Communications - Information Loss Through the Front Door.mp4 |
58.43MB |
Using capture-the-flag to enhance teaching and training.mp4 |
31.19MB |
Using the the 36 stratagems for Social Engineering.mp4 |
66.69MB |
Valery Berestetsky, Jonathan Schaaf - Speaker Interview - SOURCE Austin.mp4 |
10.05MB |
Vince Warrington - Pre-Conference Interview - SOURCE Boston.eng.srt |
12.96KB |
Vince Warrington - Pre-Conference Interview - SOURCE Boston.mp4 |
8.99MB |
Voight-Kampff ing The BlackBerry PlayBook.mp4 |
49.21MB |
Vulnerabilities of Control Systems in Drinking Water Utilities.mp4 |
50.37MB |
Vulnerability in the Real World - Lessons from both sides of the fence.mp4 |
59.39MB |
VulnPanel.pptx |
164.64KB |
Wade Woolwine and Josh Feinblum - Getting the most from your managed security providers.eng.srt |
80.76KB |
Wade Woolwine and Josh Feinblum - Getting the most from your managed security providers.mp4 |
46.17MB |
Walter Williams - Pre-Conference Interview.eng.srt |
20.86KB |
Walter Williams - Pre-Conference Interview.mp4 |
13.33MB |
Watchtowers of the Internet - Analysis of Outbound Malware Communication.mp4 |
48.45MB |
Web Application Panel.mp4 |
56.90MB |
Wendy Poland and David Lenoe - Bullseye on Your Back.mp4 |
75.03MB |
We See The Future And It s Not Pretty.mp4 |
53.21MB |
What Permissions Does Your Database User REALLY Need.mp4 |
41.16MB |
Why Developers And Vulnerability Researchers Should Collaborate.mp4 |
31.16MB |
William Cook and McGuire- Woods Data Breach - Let The Finger Pointing Begin.eng.srt |
83.67KB |
William Cook and McGuire- Woods Data Breach - Let The Finger Pointing Begin.mp4 |
50.89MB |
Windows File Pseudonyms.pptx |
709.70KB |
Wireless Sensor Networking As An Asset And A Liability.mp4 |
65.55MB |
Xiaoning Li - iROP Interesting ROP gadgets - SOURCE Security Conference.eng.srt |
54.87KB |
Xiaoning Li - iROP Interesting ROP gadgets - SOURCE Security Conference.mp4 |
30.93MB |
Your car passed inspection but what about your software.mp4 |
46.85MB |
Your PCI Assessor - Best Friend or Worst Enemy You Choose....mp4 |
52.13MB |
Zach Lanier - Mapping And Evolution Of Android Permissions - SOURCE Security Conference.eng.srt |
87.84KB |
Zach Lanier - Mapping And Evolution Of Android Permissions - SOURCE Security Conference.mp4 |
48.54MB |