Check out this two-part video presentation of the ShmooCon Firetalks. There are security gems to be had. In fact, these talks were probably my favorites of the weekend. I wasn’t there for all of them, but I enjoyed what I saw.These are broken into two parts.For the description of each talk, what time they occurred and who presented them, a full breakdown is available on the NovaInfosecPortal.com site. I also want to acknowledge the folks who organized these talks:–Jack “@jack_daniel” Daniel (sponsorship) –Adrian “@irongeek_adc” Crenshaw (session recordings)–Georgia “@vincentkadmon” Weidman (backup session recordings; streaming)–Mike “@rybolov” Smith (fireplace; judging panel)–Nathi “@nathiet” Thwala (TBD)–Jason “@jasonmoliver” Oliver (security – the physical kind)–DaKahuna (@DaKahuna2007) (A/V coordination; timer) NIGHT 1 FireTalks at Shmoocon 2011, Night 1 from Adrian Crenshaw on Vimeo. NIGHT 2Enjoy, and thanks also to Adrian Crenshaw for compiling these videos on his Irongeek.com site and for making the embed code available so folks like me could grab it. –Bill Brenner Related content news Gwinnett Medical Center investigating possible data breach After being contacted by Salted Hash, Gwinnett Medical Center has confirmed they're investigating a security incident By Steve Ragan Oct 02, 2018 6 mins Regulation Data Breach Hacking news Facebook: 30 million accounts impacted by security flaw (updated) In a blog post, Facebook’s VP of product management Guy Rosen said the attackers exploited a flaw in the website's 'View As' function By Steve Ragan Sep 28, 2018 4 mins Data Breach Security news Scammers pose as CNN's Wolf Blitzer, target security professionals Did they really think this would work? By Steve Ragan Sep 04, 2018 2 mins Phishing Social Engineering Security news Congress pushes MITRE to fix CVE program, suggests regular reviews and stable funding After a year of investigation into the Common Vulnerabilities and Exposures (CVE) program, the Energy and Commerce Committee has some suggestions as to how it can be improved By Steve Ragan Aug 27, 2018 3 mins Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe