BSides London is an annual community-driven security conference which, this year, will be taking place at the Kensington and Chelsea Town Hall in London.
Graham’s talk coincides with the disclosure of a set of vulnerabilities in the administration features of the Citrix NetScaler appliance, which will be discussed in the talk. Continue reading
In a recent ‘The Cost of Cyber Crime’ report, the government estimated Cyber Crime costs the UK economy around £27bn a year. Businesses paid around £21bn, the Government £2.2bn and citizens £3.1bn (Gov.uk, 2011). Continue reading
44CON is an annual Information Security Conference and Training event taking place at the Millenium Conference Centre in London. The event is designed to provide something for both the business and technical Information Security Professionals. Continue reading
Once again, this October, Portcullis will be attending the e-Discovery and e-Investigations 2013 event in London.
Portcullis comes to e-Discovery (e-Disclosure) from a forensic background and with real technical expertise.
Our security professionals within the fields of e-Discovery and Digital Forensics will be on our stand to offer advice and consult with delegates from across the full range of industry sectors.
Richard Dean of Portcullis and Sumit Siddharth of 7safe, will be jointly speaking and presenting their findings on the ‘The Art of Exploiting Logical Flaws in Web Apps’ at the Black Hat conference in Abu Dhabi, UAE. The conference will take place between the 3rd and 6th of December at the Emirates Palace.
The Black Hat Conference briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world – from the corporate and government sectors to academic and even underground researchers. The environment is strictly vendor-neutral and focused on the sharing of practical insights and timely, actionable knowledge. Black Hat Conference remains the best and biggest event of its kind, unique in its ability to define tomorrow’s information security landscape. Continue reading