April 6th Meeting – Software Bill-of-Materials with OWASP CycloneDX by OWASP project lead
Recent vulnerabilities, like those for Log4J, have revealed the importance of knowing all the components of a software product. Software
Continue readingUpstate South Carolina's DEF CON Group
Recent vulnerabilities, like those for Log4J, have revealed the importance of knowing all the components of a software product. Software
Continue readingHow to win friends, influence people and convey risk using ChatGPT. In this talk we’ll explore how leveraging artificial intelligence
Continue reading&drew will walk through his career pivot, what he found to be successful, what did not work, and then provide
Continue readingTL;DR: A clutch win with three minutes to spare. Simple mistakes eat dozens of minutes. PEN-210 is an up-to-date course
Continue readingDo you ever wonder about the editor wars and how emacs won? Join us as we take a fresh emacs
Continue readingCVE, CWE, ATT&CK, and OWASP, so many ways to describe risk, but how do they work? This talk will help
Continue readingJoin us this November (11/03 at 6 PM) for the telling of tales from the field by community member rbrins.
Continue readingMost skills take time to hone and master. I’m not only referring to technical but also soft skills related to
Continue readingThis Thursday 8/4 we have a special guest speaker from the Electronic Frontier Foundation (EFF), Alexis Hancock Director of Engineering,
Continue readingOverview Mitre ATT&CK calls out Exfiltration Over Web Service: Exfiltration to Code Repository as technique https://attack.mitre.org/techniques/T1567/001/. While it specifically gives an
Continue reading