17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
1. O'Reilly Security Conference Keynotes/Conceptualizing attribution and why it matters - Benjamin Buchanan (Harvard University).mp4
202.2 MB
1. O'Reilly Security Conference Keynotes/From possible to practical The path for defense - Dan Kaminsky (White Ops).mp4
136.3 MB
1. O'Reilly Security Conference Keynotes/Innovation versus invasion Inserting privacy controls and due process into semi-autonomous algorithms - Matthew Carroll (Immuta Inc).mp4
32.8 MB
1. O'Reilly Security Conference Keynotes/Lessons learned from running big bug bounty programs - Katie Moussouris (Luta Security).mp4
256.7 MB
1. O'Reilly Security Conference Keynotes/My heart depends on your code - Marie Moe (SINTEF).mp4
238.8 MB
1. O'Reilly Security Conference Keynotes/The world will see (and just saw) an Internet zombie apocalypse - Phil Stanhope (Dyn).mp4
197.4 MB
2. Security in context (security datasci)/Architectural design for legal analytics - Steve Touw (Immuta).mp4
370.3 MB
2. Security in context (security datasci)/Beyond matching Applying data science techniques to IOC-based detection - Alex Pinto (Niddel).mp4
439.6 MB
2. Security in context (security datasci)/Expanding the blue team by building a security culture program - Masha Sedova (Salesforce).mp4
374.2 MB
2. Security in context (security datasci)/Moving beyond Threatbutt or Threat Landscape 2039 - Trey Darley (Kingfisher Operations, sprl).mp4
409 MB
2. Security in context (security datasci)/Practical network forensics - Marcelle Lee (Fractal Security Group, LLC) and Lisa Foreman-Jiggetts (Women's Society of Cyberjutsu) - Part 1.mp4
698.5 MB
2. Security in context (security datasci)/Practical network forensics - Marcelle Lee (Fractal Security Group, LLC) and Lisa Foreman-Jiggetts (Women's Society of Cyberjutsu) - Part 2.mp4
704.1 MB
2. Security in context (security datasci)/Security analytics using big data and Apache Hadoop Beyond the hype - Eddie Garcia (Cloudera).mp4
335.4 MB
3. Tech, tools, and processes/Common vulnerabilities and exposures in containers What to know - Quentin Machu (CoreOS).mp4
331.4 MB
3. Tech, tools, and processes/Continuous auditing for effective compliance with Rudder - Jonathan Clarke (Normation).mp4
331.5 MB
3. Tech, tools, and processes/Developing a secure and scalable frontend - James Baker (LinkedIn) and Mira Thambireddy (LinkedIn).mp4
277.5 MB
3. Tech, tools, and processes/Drilling into network data with Apache Drill - Charles Givre (Booz Allen Hamilton) - Part 1.mp4
637.9 MB
3. Tech, tools, and processes/Drilling into network data with Apache Drill - Charles Givre (Booz Allen Hamilton) - Part 2.mp4
577.1 MB
3. Tech, tools, and processes/From dev to production Security best practices on managing Amazon Web Services (AWS) environments - Dan Amiga (Fireglass) and Dor Knafo (Fireglass).mp4
346.5 MB
3. Tech, tools, and processes/Hands on with InSpec - Mandi Walls (Chef).mp4
689.2 MB
3. Tech, tools, and processes/Integrating security into DevOps - Ernest Kim (MITRE Corp.).mp4
341.1 MB
3. Tech, tools, and processes/Macaroons More cookie than cookie - Brian Sletten (Bosatsu Consulting).mp4
410.4 MB
3. Tech, tools, and processes/Machine learning to improve random number generators - Richard Freytag (Freytag & Company, LLC).mp4
292.6 MB
3. Tech, tools, and processes/PAL is your pal Bootstrapping secrets in Docker - Nick Sullivan (CloudFlare).mp4
306 MB
3. Tech, tools, and processes/Practical tips for web application security in the age of Agile and DevOps - Zane Lackey (Signal Sciences).mp4
360.4 MB
3. Tech, tools, and processes/The bad things happen when you're not looking - Ryan Huber (Slack Technologies, Inc) and Nate Brown (Slack Technologies, Inc).mp4
273.2 MB
3. Tech, tools, and processes/The industrial age of website bots How to detect and block automated attacks - Ido Safruti (PerimeterX) and Ariel Sirota (PerimeterX) - Part 1.mp4
415.8 MB
3. Tech, tools, and processes/The industrial age of website bots How to detect and block automated attacks - Ido Safruti (PerimeterX) and Ariel Sirota (PerimeterX) - Part 2.mp4
565.5 MB
4. Bridging business and security/Continuous security - Stein Inge Morisbak (Bekk Consulting AS) and Erlend Oftedal (Blank Oslo).mp4
332.1 MB
4. Bridging business and security/Leveraging isolation technologies for improved security and productivity - Dan Amiga (Fireglass) and Dor Knafo (Fireglass).mp4
381.2 MB
4. Bridging business and security/Link complex regulation to practical security - Wayne Anderson (Avanade).mp4
325.2 MB
4. Bridging business and security/Scalable threat modeling with risk patterns - Stephen de Vries (ContinuumSecurity).mp4
348.1 MB
4. Bridging business and security/Speak security and enter Making security make sense for nontechnical users - Jessy Irwin (Mercury Public Affairs).mp4
398.7 MB
4. Bridging business and security/US and EU data security and data privacy issues in M&A transactions - Shannon Yavorsky (Kirkland & Ellis LLP).mp4
380 MB
5. The human element/A technical dive into defensive trickery - Dan Kaminsky (White Ops).mp4
361.1 MB
5. The human element/Building a cross-functional incident response team - Jennifer Martin (Covington & Burling).mp4
504.3 MB
5. The human element/Gamify security training with developer CTFs - Kyle Rankin (Final, Inc.).mp4
287.3 MB
5. The human element/rkt’s architecture and security features - Frederic Branczyk (CoreOS).mp4
305.1 MB
5. The human element/Security by consent - Brendan O'Connor (Malice Afterthought, Inc.).mp4
373.5 MB
5. The human element/Security through design Making security better by designing for people - Jelle Niemantsverdriet (Deloitte).mp4
402.8 MB
5. The human element/Threading the needle of mobile security and user privacy - James Plouffe (MobileIron).mp4
361.4 MB
5. The human element/Who owns open source security - Guy Podjarny (Snyk).mp4