Security

Red Hat Security

Understanding software supply chain threats

What security threats lurk in the software supply chain? Join David Mair, Senior Manager with the Product Security Supply Chain team at Red Hat, to hear how security vulnerabilities at each point of the software supply chain can jeopardize the integrity of your IT infrastructure and the data on it. Have you ever wondered how […]

Read More
Quantum Computing Security

Computer researcher speaks on the revolution of quantum computing

This interview with Jack Hidary covers the most important things you need to know about quantum computing. A little about Jack Hidary’s take on Quantum Computing & cryptography: Quantum computers will soon be able to crack classical encryption, resulting in a massive leakage of sensitive data and secrets. The international cybersecurity community is rushing to […]

Read More
Red Hat Security

Hardening Your Open Source Software

With all the data breaches in the new lately, now may be a good time to learn more about securing your stuff. Emmy is the senior manager for the supply chain group that falls under our product security organization. Her team is focused on securing the systems involved with modifying and storing our offering code. […]

Read More
Security

Uber Data Breach Shows Problems with 2FA – ThreatWire

So much security news this week. The LastPass Hack Lasted Four Days, Uber Data Breach Shows Problems with 2FA, Putty is being used to backdoor victims, and a HUGE giveaway you won’t wanna miss! All that coming up now on ThreatWire. #threatwire #hak5

Read More
Quantum Computing Security

Understanding and Explaining Post-Quantum Crypto with Cartoons

Are you an IT security professional, but not a mathematician? This session will explain you how post-quantum cryptography works—with a 100 percent cartoon-based slide show.

Read More
Security

10 HACKING tools you MUST know about!

You already know not to take candy from strangers, but it may be time to add cables to the list of things not to accept from strangers. Naomi just got back from DefCon where I explored all kinds of hacking tools that are disguised as everyday items you might regularly use. The takeaways: Don’t borrow […]

Read More
Security

How to get into Cybersecurity with No Experience – The Ultimate Guide

Given the state of the world and technology infrastructure, there has never been a better time to get into cybersecurity. In this video Josh breakings down the steps anyone can take to get a job and start a career in cybersecurity. If you follow these steps and do the BEST you can at each step, […]

Read More