CES – singularity and securing the car
What's in store for automotive security once cars morph into mobile living rooms and working spaces? And how about transportation at large?
Education: CISSP, RHCSA
Highlights of your career? Reverse engineering human brain patterns.
What malware do you hate the most? Nation state sponsored low and slow.
Favorite activities? Building and flying airplanes.
What is your golden rule for cyberspace? Stupid hurts.
When did you get your first computer and what kind was it? 1988, Radio Shack TRS-80.
Favorite computer game/activity? Java/Big Data algorithms to find brain patterns.
What's in store for automotive security once cars morph into mobile living rooms and working spaces? And how about transportation at large?Cameron Camp
A welcome return to the hacker conferences of yesteryearCameron Camp
Striking the balance between supply, demand and safety is a major concernCameron Camp
Some tips from the floor of VB 2018 for helping to keep your data more secureCameron Camp
Heralded as the answer to many cybersecurity issues, machine learning hasn’t always deliveredCameron Camp
Aiming to protect critical infrastructure against attacksCameron Camp
IoT security may have finally turned the corner towards a more secure future.Cameron Camp
The challenges facing critical infrastructure systemsCameron Camp
Securely keeping track of data and security applicationsCameron Camp
Bitcoin gets all the press these days when it comes to cryptocurrency but the gap in market capitalization is narrowing.Cameron Camp
Not content anymore to just have a bed made of soft plushy stuff, now you can adjust everything about the bed, from electronically sitting up in bed to the lighting surrounding your nap: connected digital technology everywhere.Cameron Camp
The first obvious candidate was banking, a sector that has been hard at work trying to implement blockchain to secure the vast troves of digital transactions that happen every microsecond of every day.Cameron Camp
One side effect of slower than expected uptake of VR is that virtual reality application developers have been slow to invest in creating content. In this sort of chicken-and-egg cycle, growth tends to be slow, not explosive.Cameron Camp
Row after row of startup tech here has tiny modules designed to be mashed up into the next big thing if their founders have anything to say about it, and the trend continues.Cameron Camp
Trick the firmware and you have access to the whole system. Here at Black Hat, there are a lot of people doing just that.Cameron Camp
If industry frameworks are to inform and secure the critical infrastructure writ large, here at Black Hat there a lot of people punching holes in them, and in simple ways.Cameron Camp
This year at Black Hat, tiny automated hacking platforms are everywhere, loaded with tasty purpose-built tools that can be used to break into your systems.Cameron Camp
Cameron Camp, in attendance at this year's Black Hat in Las Vegas, takes a closer look at attacks against physical infrastructure.Cameron Camp
This year at Black Hat, it will be incumbent upon newer vendors to make sensational claims to gain market share from established vendor, says Cameron Camp.Cameron Camp
ISPs have started to monetize customer information quietly while selling them bandwidth. The temptation is strong, as that kind of aggregate data has real value on the secondary market, but what about the customers’ privacy?Cameron Camp