All Talks

Wi Fi Threat Modeling and Monitoring

With the widespread use of wireless Internet access, we see that the use of portable technologies is rapidly increasing. Increasing public networks and facilitating access to these networks have attracted the attention of attackers. Due to easy availability of mature honeypot creation tools, this attack is a slam dunk for even the most novice of Wi-Fi attackers. Enterprise security products have tried but failed to solve this problem with rule and lockdown based approaches. In this talk, we are …

You might be interested in:

February 2018 Security
Pushing left like a boss Pushing left like a boss

Pushing left like a boss

Pushing left like a boss