40:34Detections and Dragons Creating Logic that Scales -Rachel Schwalk & Mak FossBSidesKC20 views·11 months ago
40:32AI Agents Augmenting Vulnerability Analysis and Remediation - Peyton SmithBSidesKC386 views·11 months ago
40:32Securing the SkiesThe Challenges of Safety and Security in Aviation- Lillian Ash BakerBSidesKC14 views·11 months ago
46:26Hacking the Machine Unmasking the Top 10 LLM Vulnerabilities and Real-World Exploits - Reet KaurBSidesKC156 views·11 months ago
16:45How to feed a dog solving knowledge retention with KM practices - Brian McCannBSidesKC22 views·2 years ago
53:10Fight, Flight, or Something Else Breaking the Security Survival Cycle - Stacy Thayer, Ph.D.BSidesKC37 views·2 years ago
22:07Dr. CVE Love, or how I learned to stop worrying and love vuln management - Ben WebbBSidesKC90 views·2 years ago
40:07Active Directory ain’t going anywhere, so we might as well secure it - Eric WoodruffBSidesKC199 views·2 years ago