Event - Blue-Hat-Security-Briefings_BlueHat-Security-Briefings-Fall-2013-Sessions


The Surveillance Landscape and Resistant Design [MP4] [0:42:59] [2014/05/14]
In this BlueHat 2013 talk, Google's Morgan Marquis Boire discusses the change in the surveillance landscape and security design decisions.


The Psychology of Computer Insecurity [MP4] [0:47:03] [2014/05/14]
Computer scientist Peter Gutmann discusses the various psychological elements of the security experience during this BlueHat 2013 talk.


Getting Up To Speed With Message Analyzer[MP4] [0:42:44] [2014/05/14]
In this BlueHat 2013 talk, Microsoft's Serge Mara and Chris Kaler discuss Message Analyzer, the modern tool for capturing, displaying and analyzing interactions in systems.


Security EcoSystem Outreach[MP4] [0:35:12] [2014/05/14]
Trustworthy Computing's Katie Moussouris talks about the history of the outreach process in this BlueHat 2013 talk.


PowerShell Best Practices[MP4] [0:20:47] [2014/05/14]
Microsoft's Lee Holmes talks about PowerShell operational security and PowerShell encrypting security in this BlueHat 2013 talk. Slides here: …


PowerShell Code Integrity[MP4] [0:19:01] [2014/05/14]
In this BlueHat 2013 talk, researcher James Forshaw discusses PowerShell and how to bypass code integrity in 140 characters or fewer.