Blog

The NULLCON Podcast: Episode 1 with Troy Hunt

In the first episode of The NULLCON Podcast, Australian Web Security Expert, Troy Hunt talked about Have I Been Pawned?, Data Breaches, Identity & Authentication.

Listen to the Podcast

CryptoParty at nullcon Goa 2018

CryptoParty

The Cryptoparty is a safe welcoming space to help people understand the digital systems that are available for use to protect yourself and those around you.

Read More

Program analysis for Secure Smartphones

In the last few years, we have seen an increased number of cyber-attacks that affected a record number of systems, ransomware spreading everywhere in the world and the numerous data breaches.

Read More

Securing the Software

In the last few years, we have seen an increased number of cyber-attacks that affected a record number of systems, ransomware spreading everywhere in the world and the numerous data breaches.

Read More

Securing the Financial Sector

As the Indian Government started its transition to cashless economy and online payment systems, the question of financial sector security is being raised more and more each day.

Read More

AI in Information Security: Transformation has Started

Artificial Intelligence is being successfully integrated across leading industries and Information Security domain is not an exception.

Read More

The place of Binary Analysis on Application Security

Binary code analysis is a fairly new approach in application security domain and it is changing the way of software security perception.

Read More


Nullcon Civil Society Track

Since its inception in 2010, NullCon has focused on information security at its root. It has served as a space for researchers and organizations to present their work,

Read More


Top takeaways from IoT Security Nullcon chat

In our third session of #Nullconchat, Stephen A. Ridley, founder and CTO of Senrio graced a one-hour long session taking questions on IoT security. Here’s how it went:

Read More


Companies must understand security is no longer restricted to end-points: Symantec

As an organisation grows in business, infrastructure and resources, it also invites a potential risk of being the target of a security attack. Companies

Read More


Top takeaways from hacking for beginners Nullcon chat

Continuing our series of Nullcon chat, Jennifer Sunshine, CEO of IOActive held a live chat and answered questions on how to hone your hacking skills if you are just starting

Read More


Top takeaways from web app security Nullcon chat

So, we had our first live Nullcon chat with web security expert and cofounder of Appseco, Akash Mahajan. In an hour-long Twitter session, Akash took on a host of questions

Read More


Securing the backbone of your Telecom network

Telecom security is still evolving. With voice and video services getting more mainstream, security of a 3G / 4G network is imperative

Read More


Common vulnerabilities in SAP and why it needs to be a bigger concern

SAP enterprise applications are the core of any large scale company. ERP and other business critical applications based on SAP are being used

Read More


How to write a research paper that makes the cut

Reviewers of Nullcon CFP talk to us about the common mistakes researchers make and how to avoid them

Read More


Writing secure software code - the first step towards cybersecurity

Ashok Sharma was speaking to a hall full of developers on a Saturday in Bengaluru. Majority of the crowd that had come to attend Open Source India

Read More


Deception Technology: The art of staying ahead of the bad guys

What are the chances you can detect a targeted attack using deception technology? Pretty high, say experts in the technology.

Read More

Copyright © 2018-19 | Nullcon India | International Security Conference | All Rights Reserved