DefCamp, profile picture

DefCamp

Sort by
Remote Yacht Hacking
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
The Charter of Trust
Internet Balkanization: Why Are We Raising Borders Online?
Bridging the gap between CyberSecurity R&D and UX
Secure and privacy-preserving data transmission and processing using homomorphic encryption
Drupalgeddon 2 – Yet Another Weapon for the Attacker
Economical Denial of Sustainability in the Cloud (EDOS)
Trust, but verify – Bypassing MFA
Threat Hunting: From Platitudes to Practical Application
Implementation of information security techniques on modern android based Kiosk ATM/remittance machines
Lattice based Merkle for post-quantum epoch
Building application security with 0 money down
The challenge of building a secure and safe digital environment in healthcare