Blog
NULLCON Online Training Success Story
Even with a pandemic hovering over us, we at Nullcon were determined to find out ways to keep the ball rolling. We are filled with pride to announce that we had a super successful first edition of the Nullcon online training sessions. With the best of trainers and super enthusiastic participants, all of us had something to take back home (while we were at home!).
What is Resume and Career Clinic?
Writing a strong Curriculum Vitae (CV) is a crucial step in your search for the right career, job, internship, but also for other things such as community engagement.
Deepfakes Explained
In my last blog, I talked about AI/ML from the perspective of a non-techie. In this one, I will be talking about deepfakes. Let's start with a simple explanation of them.
A Non-Technical Guide to AI/ML for Security
I write this blog in the hopes of breaking the stereotype: AI/ML is reserved only for the technical audience.
Explanation of Vaishyanath
If you really want to know about it, you should know how we reached here. It was 17 minutes to 2 P.M. in the afternoon and we were putting our big heads together to come up with a suitable hashtag for the 11th edition of Nullcon.
Bug Bounty Programs & What They Mean for Hunters and Companies
Bug bounty hunters, or the morally sophisticated hackers, are those who look for vulnerabilities in software systems only to report them responsibly to the concerned organizations. Bug bounty hunters help companies find about the vulnerabilities in their applications before hackers can exploit them.
The State of Digital Security in 2018 [An Honest Look]
2018 has been a roller-coaster ride when it comes to cybersecurity. As we near the end of 2018, let's go back over the major security loopholes that got exposed and exploited, all over the world.
DevSecOps – The What, Why, and How?
DevOps is not only about software development and operations. To make complete utilization of the flexibility in DevOps approach, it is desirable for software developers to integrate IT security at every step during a software's life cycle. It is, in essence, what DevSecOps is.
All You Need to Know About Secure Code Development
Security flaws and vulnerabilities damage software systems today. To combat them, we can focus on practices that prevent security flaws right in the development phase where it is cost-effective to do so than correcting them in the testing or deployment phase.
CryptoParty at nullcon Goa 2018
CryptoParty
The Cryptoparty is a safe welcoming space to help people understand the digital systems that are available for use to protect yourself and those around you.
Program analysis for Secure Smartphones
In the last few years, we have seen an increased number of cyber-attacks that affected a record number of systems, ransomware spreading everywhere in the world and the numerous data breaches.
Securing the Software
In the last few years, we have seen an increased number of cyber-attacks that affected a record number of systems, ransomware spreading everywhere in the world and the numerous data breaches.
Securing the Financial Sector
As the Indian Government started its transition to cashless economy and online payment systems, the question of financial sector security is being raised more and more each day.
AI in Information Security: Transformation has Started
Artificial Intelligence is being successfully integrated across leading industries and Information Security domain is not an exception.
The place of Binary Analysis on Application Security
Binary code analysis is a fairly new approach in application security domain and it is changing the way of software security perception.
Nullcon Civil Society Track
Since its inception in 2010, NullCon has focused on information security at its root. It has served as a space for researchers and organizations to present their work,
Top takeaways from IoT Security Nullcon chat
In our third session of #Nullconchat, Stephen A. Ridley, founder and CTO of Senrio graced a one-hour long session taking questions on IoT security. Here’s how it went:
Companies must understand security is no longer restricted to end-points: Symantec
As an organisation grows in business, infrastructure and resources, it also invites a potential risk of being the target of a security attack. Companies
Top takeaways from hacking for beginners Nullcon chat
Continuing our series of Nullcon chat, Jennifer Sunshine, CEO of IOActive held a live chat and answered questions on how to hone your hacking skills if you are just starting
Top takeaways from web app security Nullcon chat
So, we had our first live Nullcon chat with web security expert and cofounder of Appseco, Akash Mahajan. In an hour-long Twitter session, Akash took on a host of questions
Securing the backbone of your Telecom network
Telecom security is still evolving. With voice and video services getting more mainstream, security of a 3G / 4G network is imperative
Common vulnerabilities in SAP and why it needs to be a bigger concern
SAP enterprise applications are the core of any large scale company. ERP and other business critical applications based on SAP are being used
How to write a research paper that makes the cut
Reviewers of Nullcon CFP talk to us about the common mistakes researchers make and how to avoid them
Writing secure software code - the first step towards cybersecurity
Ashok Sharma was speaking to a hall full of developers on a Saturday in Bengaluru. Majority of the crowd that had come to attend Open Source India
Deception Technology: The art of staying ahead of the bad guys
What are the chances you can detect a targeted attack using deception technology? Pretty high, say experts in the technology.