Learn about business logic vulnerabilities in web applications through foundational theories and detailed technical demonstrations of real-world exploits.
Posts tagged with "Security"
16 presentations found
Cloud-dependent IoT devices are just bots controlled by a trusted C2—learn how to take control of your smart home with Home Assistant and local control methods.
PowerShell has revolutionized automation for system administrators—learn the fundamentals of PowerShell security and best practices to safeguard your scripting environment.
Financial scammers are evolving—learn why invoice scams are so effective and how IT can help prevent companies from losing money to these sophisticated attacks.
Just hired to manage a thousand Macs? Learn the basics of Mac Management, Software Distribution and Security from an expert managing 2500 Macs at ORNL.
Single Source of Truth
Explore ORNL's application that consolidates data from multiple management and security systems into a high-confidence repository—building a holistic view of devices in a dynamically changing landscape.
Explore the state of IoT security in 2018—learn about unique security considerations for low-power infrastructure devices and best practices for organizations that leverage them.
Supercharge your IR capabilities by preemptively collecting forensic evidence as baselines—learn actionable techniques for capturing artifacts BEFORE incidents occur and actions to take WHEN they happen.
Bridge the gap between DevOps and Security with InSpec—bringing compliance into the pipeline so everyone can join the adventure (even Security).
Gain a practical understanding of SAML, its differences from OAuth, and how ORNL implemented and tested it to enable secure, seamless authentication.
Discover how to engineer trust into your systems and teams—an essential foundation for scaling infrastructure, organizations, and hybrid cloud deployments.
Learn how ORNL navigated the Windows 10 migration journey, tackling deployment challenges and unlocking new opportunities for security, support, and user productivity.
Explore the strengths, challenges, and real-world lessons of deploying CFEngine, a lightweight yet powerful configuration management tool.
In this discussion we will talk about best practices for managing access and permission to files and devices using Active Directory Groups to simplify administration and reduce the headaches caused by access issues for users.
How to (Not) Get Owned
This talk will attempt to detail multiple real world attacks (ones that actually get you owned) in a "lessons learned" format, cutting through the hype and focusing on practical security threats.
Related Tags
Tags that frequently appear together with Security