36 results

Evaluation of the DFET Cloud.

Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., Keane, E., Callahan, C., …Popov, O. (2015, September)
Evaluation of the DFET Cloud. Paper presented at Cybercrime Forensics Education and Training (CFET) conference, Canterbury
The DFET (Digital Forensics Evaluation and Training) Cloud creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated sta...

Cyber security challenges for cloud based services.

Presentation / Conference
Buchanan, W. J. (2015, June)
Cyber security challenges for cloud based services. Paper presented at Scot-Cloud 2015, Dynamic Earth, Edinburgh
Areas covered - IoT security - Data loss detection and prevention - Cryptography in the Cloud

Teaching penetration and malware analysis in a cloud-based environment.

Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., & Russell, G. (2015, June)
Teaching penetration and malware analysis in a cloud-based environment. Paper presented at UK Workshop on Cybersecurity Training & Education, Liverpool
This paper outlines evaluation of running a private Cloud-based system over two semesters at Edinburgh Napier University for two modules: Security Testing and Advanced Network...

Vulnerability analysis.

Presentation / Conference
Buchanan, W. J. (2015, May)
Vulnerability analysis. Presented at Advanced Threat Protection, Glazier's Hall, London
The current generation of threats against enterprise networks are more targeted, more persistent and more sophisticated than ever. Sony, eBay and JP Morgan are among the bigge...

Identifying areas of vulnerability.

Presentation / Conference
Buchanan, W. J. (2015, April)
Identifying areas of vulnerability. Presented at Scot-secure 2015, Dynamic Earth, Edinburgh
Using penetration testing to highlight areas of weakness with practical steps for improving the security of your organisation.

New forensic investigation and training methods in a virtual environment (cloud) (D-FET project).

Presentation / Conference
Buchanan, W. J., & Smales, A. (2015, April)
New forensic investigation and training methods in a virtual environment (cloud) (D-FET project). Paper presented at Cybercrime and Cyberterrorism - the EU Research roadmap, Montpellier, France
DFET creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated stakeholders in the fight against cybercrime through the ...

It's all hackable.

Presentation / Conference
Buchanan, W. J. (2015, February)
It's all hackable. Paper presented at SBRC Insider Threat Conference 2015, RBS, Gogarburn

Cyber security in practice: identifying areas of vulnerability.

Presentation / Conference
Buchanan, W. J., & Smales, A. (2015, February)
Cyber security in practice: identifying areas of vulnerability. Paper presented at Scot-Secure 2015, Holyrood, Edinburgh
Areas covered include: - Using penetration testing to highlight areas of weakness - Practical steps for improving the security of your organisation.

Advanced persistent threat and Insiders.

Presentation / Conference
Buchanan, W. J. (2015, January)
Advanced persistent threat and Insiders. Paper presented at Advanced Persistent Threat, London
With an increase in the range and mobility of devices which connect to the network, there are now so many opportunities for intruders to compromise systems. Leading with the r...

Complete anatomy of Heartbleed, Truecrypt and large-scale vulnerabilities.

Presentation / Conference
Buchanan, W. J. (2014, September)
Complete anatomy of Heartbleed, Truecrypt and large-scale vulnerabilities. Paper presented at 7th International Conference on Security of Information and Networks (SIN 2014), Glasgow
This presentation will outline some new research related to the Heartbleed vulnerability, and cover the full technical details of the threat, with a live demo. Along with it w...