The Surveillance Landscape and Resistant Design [MP4] [0:42:59] [2014/05/14]In this BlueHat 2013 talk, Google's Morgan Marquis Boire discusses the change in the surveillance landscape and security design decisions.
The Psychology of Computer Insecurity [MP4] [0:47:03] [2014/05/14]Computer scientist Peter Gutmann discusses the various psychological elements of the security experience during this BlueHat 2013 talk.
Getting Up To Speed With Message Analyzer[MP4] [0:42:44] [2014/05/14]In this BlueHat 2013 talk, Microsoft's Serge Mara and Chris Kaler discuss Message Analyzer, the modern tool for capturing, displaying and analyzing interactions in systems.
Security EcoSystem Outreach[MP4] [0:35:12] [2014/05/14]Trustworthy Computing's Katie Moussouris talks about the history of the outreach process in this BlueHat 2013 talk.
PowerShell Best Practices[MP4] [0:20:47] [2014/05/14]Microsoft's Lee Holmes talks about PowerShell operational security and PowerShell encrypting security in this BlueHat 2013 talk. Slides here: …
PowerShell Code Integrity[MP4] [0:19:01] [2014/05/14]In this BlueHat 2013 talk, researcher James Forshaw discusses PowerShell and how to bypass code integrity in 140 characters or fewer.