NCC Group, profile picture

NCC Group

Sort by
How we breach small and medium enterprises (SMEs)
Practical SME Security on a Shoestring
The Mobile Internet of Things and Cyber Security
Current & Emerging Cyber Security Threats
NCC Group 44Con Workshop: How to assess and secure ios apps
Real World Application Threat Modelling By Example
Pki 201 Key Management
Pki 202 Architechture Models and CRLs
Cryptography101
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
07182013 Hacking Appliances: Ironic exploits in security products
2013 07-12 ncc-group_data_anonymisation_technical_aspects_v1 0
2012 12-04 --ncc_group_-_mobile_threat_war_room
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
Exploiting appliances presentation v1.1-vids-removed