CES – singularity and securing the car
What's in store for automotive security once cars morph into mobile living rooms and working spaces? And how about transportation at large?
Education: CISSP, RHCSA
Highlights of your career? Reverse engineering human brain patterns.
What malware do you hate the most? Nation state sponsored low and slow.
Favorite activities? Building and flying airplanes.
What is your golden rule for cyberspace? Stupid hurts.
When did you get your first computer and what kind was it? 1988, Radio Shack TRS-80.
Favorite computer game/activity? Java/Big Data algorithms to find brain patterns.
What's in store for automotive security once cars morph into mobile living rooms and working spaces? And how about transportation at large?
Cameron CampA welcome return to the hacker conferences of yesteryear
Cameron CampStriking the balance between supply, demand and safety is a major concern
Cameron CampSome tips from the floor of VB 2018 for helping to keep your data more secure
Cameron CampHeralded as the answer to many cybersecurity issues, machine learning hasn’t always delivered
Cameron CampAiming to protect critical infrastructure against attacks
Cameron CampIoT security may have finally turned the corner towards a more secure future.
Cameron CampSecurely keeping track of data and security applications
Cameron CampBitcoin gets all the press these days when it comes to cryptocurrency but the gap in market capitalization is narrowing.
Cameron CampNot content anymore to just have a bed made of soft plushy stuff, now you can adjust everything about the bed, from electronically sitting up in bed to the lighting surrounding your nap: connected digital technology everywhere.
Cameron CampThe first obvious candidate was banking, a sector that has been hard at work trying to implement blockchain to secure the vast troves of digital transactions that happen every microsecond of every day.
Cameron CampOne side effect of slower than expected uptake of VR is that virtual reality application developers have been slow to invest in creating content. In this sort of chicken-and-egg cycle, growth tends to be slow, not explosive.
Cameron CampRow after row of startup tech here has tiny modules designed to be mashed up into the next big thing if their founders have anything to say about it, and the trend continues.
Cameron CampTrick the firmware and you have access to the whole system. Here at Black Hat, there are a lot of people doing just that.
Cameron CampIf industry frameworks are to inform and secure the critical infrastructure writ large, here at Black Hat there a lot of people punching holes in them, and in simple ways.
Cameron CampThis year at Black Hat, tiny automated hacking platforms are everywhere, loaded with tasty purpose-built tools that can be used to break into your systems.
Cameron CampCameron Camp, in attendance at this year's Black Hat in Las Vegas, takes a closer look at attacks against physical infrastructure.
Cameron CampThis year at Black Hat, it will be incumbent upon newer vendors to make sensational claims to gain market share from established vendor, says Cameron Camp.
Cameron CampISPs have started to monetize customer information quietly while selling them bandwidth. The temptation is strong, as that kind of aggregate data has real value on the secondary market, but what about the customers’ privacy?
Cameron Camp