Cyber Security Feed

UAT, graduating cyber warriors since 2000

Request Info

Provide your information below and an Admissions Advisor will contact you shortly to answer your questions about UAT and your Advancing Technology degree program of interest.

Required Fields Are Highlighted















When do you plan on attending?

University of Advancing Technology (UAT) is pleased to provide you with additional information about the college and its programs. By hitting submit, you give us permission to use either direct-dialed, autodialed and/or pre-recorded telemarketing to call or text you at the phone number you provided. Please note that such consent is not required to attend UAT.

Need assistance with this form?

ABOUT UAT
University of Advancing Technology is an elite, private college that serves its student body by fostering knowledge creation and academic excellence in an environment that embraces the young technophiles of the world. With three centers of research and a suite of technology-centered undergraduate and graduate degrees, the University is a recognized leader in technology education.

Learn More About UAT

    Dr Greg Miles Cyber Security at UAT

    Cyber Monday Shopping Safety Tips from UAT Cyber Security Professor

    (Nov. 23, 2016)

    The holidays are almost here which means the online shopping season is upon us. With the initiative of free shipping being offered by many retailers, online shopping sure is convenient, but is it safe? UAT Cyber Security Professor Dr. Greg Miles shares his tips for safe online shopping this Cyber Monday. 1. Shop at reputable sites – check to make sure you are...

    The holidays are almost here which means the online shopping season is upon us. With the initiative of free shipping being offered by many retailers, online shopping sure is convenient, but is it safe?

    UAT Cyber Security Professor Dr. Greg Miles shares his tips for safe online shopping this Cyber Monday.

    1. Shop at reputable sites – check to make sure you are on a secure site and haven’t been redirected somewhere else before entering your personal information
    2. Use a credit card with a low credit limit
    3. Don’t use a debit card, it’s more difficult to dispute charges and the banks may take longer to issue a refund
    4. Use payment apps like Paypal
    5. Verify your order before you hit submit, take a screenshot for your records
    6. Keep track of your purchases, this is the time of year fraudulent charges can be hidden due to the potential increase
    7. Check your card statement to assure that you recognize each charge as one you made

    Do your best to safeguard yourself from identity theft and fraudulent charges with these helpful tips this holiday season, but remember it’s a fun time of year. Enjoy the festivities!

     

    read more
    less
    UAT Cyber Security students at Black Hat

    Cyber Security Students Garner Industry Experience Working Hacker Conventions in Las Vegas

    (Aug. 16, 2016)

    The iconic Black Hat and DEF CON Conventions took over Vegas the week of July 30- Aug. 7, bringing swarms of hackers, from industry and other realms. Attendees return each year for industry news, hacking, panels, training sessions, CTF challenges, parties, surprise events and more. Once again, UAT Cyber...

    The iconic Black Hat and DEF CON Conventions took over Vegas the week of July 30- Aug. 7, bringing swarms of hackers, from industry and other realms.

    Attendees return each year for industry news, hacking, panels, training sessions, CTF challenges, parties, surprise events and more. Once again, UAT Cyber Security students and alumni worked as paid volunteers for the events providing help with network setup,

    Over 60 UAT students and alumni worked behind the scenes at Black Hat and a few were also selected to work as DEF CON Goons. Students and alumni were put to work at Black Hat with tasks such as setting up the network, placing network cables down, setting up APs (access points or wifi connections), setting up switches and routers, setting up the Network Operations Command (NOC), crowd control, collecting completed documents, classroom presentation support, customer assistance and problem solving when needed.

    Game Face at Black Hat

    Game Face at Black Hat

    Network Security Professor Al Kelly attended with a group of about 60 students and alumni from UAT.

    A Black Hat Advisory Board official commented that UAT’s students were the “most energetic and helpful Conference Ambassador’s (CA) ever.” According to a CA Team Lead, “Students who were tasked with stuffing conference bags were able to pack 5,000 bags on on the first day, which beats the previous team by over 2,000 bags.”

    Sarah Weydemuller, Program Manager, Trainings of Black Hat said, “The Black Hat Conference Associates play a vital role in achieving our goals of making Black Hat USA a successful community-driven event. It’s through the dedication of Conference Associates like the students and alumni at University of Advancing Technology (UAT) that our community becomes stronger and our event runs flawlessly. UAT students show that they take pride in their work, work effectively with others, present a positive attitude through their actions, and, most importantly, focus on the customers they serve – be they attendees, speakers, or vendors. Black Hat acknowledges the dedication and commitment of the Black Hat USA 2016 Conference Associates and would like to express our heartfelt thanks to them for their contribution which helped make Black Hat USA 2016 the most robust show – both in size and content – in its 19-year history.”

    Thanks to UAT’s Russ Rogers, UAT was the only university given the chance to volunteer at Black Hat. Professor Rogers manages the volunteers at both Black Hat and DEF CON, and therefore UAT held a massive presence at each event.

    Alumni Angie Leifson had an opportunity to speak on a panel at Black Hat, “Removing Roadblocks to Diversity,” on her perspective as a female in a predominately male industry. Angie and UAT hope to change that. Watch Angie’s panel in the video below.

    You will find that DEF CON is a little more edgy than Black Hat. DEF CON was created in 1993 by a core hacker group who wanted to explore and practice technology. Today, DEF CON’s audience is more diverse with corporate businesses and government types in attendance, as well. This event is more about the practice of hacking and finding new ways to infiltrate security. The security talks are a bit more edgy and may practice and discuss topics like vehicle hacking. This year Tesla held a car hack demo to see if anyone could hack into the car’s security system. Yes they were able to crack it, but Tesla was ready to create a patch in order to avoid recalling many cars in circulation.

    Once Black Hat came to an end, the UAT student volunteers were headed to DEF CON! Because both security conferences fall on the same week, in the same city, many people attend both Black Hat and DEF CON.

    read more
    less
    DEFCON Hacking Conference

    DEF CON 24

    (Jul. 6, 2016)

    DEF CON is one of the oldest and largest continuously running hacker conventions, which seems to continue growing each year. UAT will make its usual rounds at DEF CON to connect with alumni as well as many like minded technology-driven individuals. Originally started in 1993 by The Dark Tangent, DEF CON is a unique experience for each con-goer. All events at DEF CON were conceived by...

    DEF CON is one of the oldest and largest continuously running hacker conventions, which seems to continue growing each year. UAT will make its usual rounds at DEF CON to connect with alumni as well as many like minded technology-driven individuals.

    Originally started in 1993 by The Dark Tangent, DEF CON is a unique experience for each con-goer. All events at DEF CON were conceived by the attendees. Some people play capture the flag the entire time, while many people never touch a computer at DEF CON. Some people see every speech they can, while others miss all the talks. Other activities include contests, movie marathons, scavenger hunts, sleep deprivation, lock picking, warez trading, drunken parties, spot the fed contest, the official music events. Because DEF CON is what the attendees make of it, there are more events than even we are aware of and more pop up each year.

    The UAT booth was a popular spot last year with our selection of witty t-shirts, tech swag and information on attending UAT to obtain a Bachelor’s in Network Security, Network Forensics and Network Engineering or the coveted Master of Information Assurance.

    Jeff Moss at 2016 Commencement

    Jeff Moss at 2016 Commencement

    UAT faculty and students are looking forward to working once again with Jeff Moss, DEF CON and Black Hat Founder – whom was also recognized as a 2016 UAT Honorary Doctorate recipient at Commencement for his excellence and commitment to the security industry.

    Jeff Moss has also been featured as an expert hacker in USA’s MR. ROBOT, a psychological thriller that follows a young programmer who works as a cyber-security engineer by day and a vigilante hacker by night.

    Tips for attending DEF CON

    Only bring cash unless you don’t mind having your credit cards compromised by thousands of hackers. Use care if attempting to access wireless Internet during DEF CON, many hackers are looking for you to login to their network and once they’re in wil cause some serious damage to your systems. It’s suggested to not bring or use smartphones, credit cards, laptops, and the likes to this conference, it’s not worth the risk. Those brave souls who have tried, usually find themselves being blasted on the Wall of Sheep.

    Be kind to the DEF CON Goons. Who are the Goons? They are DEF CON’s staff. They have many roles including safety, speaker coordination, vendor room coordination, network operations and more. Please try to be helpful to them and listen to any requests they make of you.

    DEF CON 24 will take place Aug. 4-7, at Paris and Bally’s Hotels in Las Vegas, Nevada.

     

    read more
    less
    Black Hat

    2016 Black Hat Briefings Conference

    (Jul. 5, 2016)

    UAT Cyber Security students will return to Black Hat in a few weeks to serve as paid volunteers assisting with various activities at the conference such as network set up, security, event organization and tear down. Year after year, ...

    UAT Cyber Security students will return to Black Hat in a few weeks to serve as paid volunteers assisting with various activities at the conference such as network set up, security, event organization and tear down. Year after year, UAT students are fortunate to have an opportunity because no other technology colleges are granted this privilege.

    Black Hat is the most technical and relevant global information security event series in the world.

    For 17 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry.

    Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.

    From its inception in 1997, Black Hat has grown from a single annual conference in Las Vegas to the most respected information security event series internationally. Today, the Black Hat Briefings and Trainings are held annually in the United States, Europe and Asia, providing a premier venue for elite security researchers and trainers to find their audience.

    Where: Mandalay Bay in Las Vegas

    When: July 30 – August 4, 2016

    For more information, visit the Black Hat site.

    read more
    less
    Ransomware interview with Fox10 Phoenix and UAT Provost Dave Bolman

    UAT Network Security Experts Featured in Ransomware Story

    (May. 10, 2016)

    What is ransomware and how should one handle it? In the UAT Cyber Warfare Range, Provost Dr. Dave Bolman and ‎Network Security‬ Professor Al Kelly comment on ‪ransomware‬ and how to handle the...

    What is ransomware and how should one handle it?

    In the UAT Cyber Warfare Range, Provost Dr. Dave Bolman and ‎Network Security‬ Professor Al Kelly comment on ‪ransomware‬ and how to handle the threat in a FOX 10 Phoenix interview with special assignment reporters Kristy Siefkin and Tishin Donkersley. 

    Ransomware - a type of malware that can be covertly installed on a computer without the knowledge of the user which restricts access to the infected computer system and demands that the user pay a ransom to the malware operators to remove the restriction. 

    ‎Network Security‬ Professor Al Kelly comment on ‪ransomware‬ and how to handle the threat in a FOX 10 Phoenix interview with special assignment reporter Kristy Siefkin.

    ‎Network Security‬ Professor Al Kelly comment on ‪ransomware‬ and how to handle the threat in a FOX 10 Phoenix interview with special assignment reporter Kristy Siefkin.

    The topic of ransomware is frequently discussed in the news like the February attack that took over Hollywood Presbyterian Medical Center with ransom set at $17,000. The institution’s computers were infected with malware, locking their records until the ransom was paid. The attack forced the hospital to return to pen and paper for its record-keeping, likely a huge procedural inconvenience in the digital age.

    So the question is… should you or should you not pay the ransom?

    See the full interview here to find out how to handle the situation if you find your data held for ransom.

     

    read more
    less
    University of Advancing Technology

    Jeff Moss The Dark Tangent, DEF CON Founder and CSO, to Receive UAT Honorary Doctorate Degree

    (Apr. 19, 2016)

    UAT Acknowledges Industry Leader in Cyber Security at Annual Commencement Ceremony Each year, University of Advancing Technology (UAT) recognizes leaders in technology who have paved the way for our future graduates to follow in their footsteps. UAT is pleased to announce DEF CON Founder...

    UAT Acknowledges Industry Leader in Cyber Security at Annual Commencement Ceremony

    Each year, University of Advancing Technology (UAT) recognizes leaders in technology who have paved the way for our future graduates to follow in their footsteps. UAT is pleased to announce DEF CON Founder and CSO, Jeff Moss also known as “The Dark Tangent,” as a recipient of an Honorary Doctorate Degree to be awarded at UAT’s Commencement Ceremony on May 6, 2016, at Mesa Arts Center.

    Moss holds many elite positions in the world of Cyber Security, serving as the Founder of DEF CON and the Black Hat Briefings, two of the largest security conferences industry-wide, as well as, an Advisor for the U.S. Department of Homeland Security Advisory Council and Vice President and Security Officer of Internet Corporation for Assigned Names and Numbers (ICANN). He is also a member of the Council on Foreign Relations (CFR) and a Senior Fellow at the Atlantic Council. Moss was awarded the President’s Award for Public Service from the Information System Security Association (ISSA). Moss holds a Bachelor’s of Arts in Criminal Justice from Gonzaga University.

    Jeff Moss, Founder and CSO of DEF CON

    Jeff Moss, Founder and CSO of DEF CON

    As a pioneer in Cyber Security, Moss is an inspiration to students enrolled in UAT’s Network Security, Network Engineering, Technology Forensics and Information Assurance degrees, many of which have worked as paid volunteers for Black Hat and DEF CON, a privilege offered primarily to UAT students.

    UAT President Jason Pistillo said, “Having built UAT’s Cyber Security curriculum in 1998 and launched it in 1999, it has been amazing to see the industry grow over the last two decades. Moss has been invaluable in spearheading this growth; what he’s done in that same time frame with DEF CON and Black Hat has been incredible to say the least, bringing the hacker community out of the shadows.”

    Program Champion of Cyber Security at UAT and CEO/CTO of Security Horizon, Russ Rogers said, “The security industry is expanding rapidly, and it’s imperative we recognize today’s most relevant thought leaders, not only for what they are doing today, but also the strides they’ve made in the past to help us arrive where we are today. Jeff Moss exemplifies the best attributes and consistent leadership of this constantly evolving, and often chaotic, industry. In 2002, UAT made its debut at DEF CON 10, and I made my debut as a Professor at the University. Now, 14 years later, UAT is still incredibly supportive of the community, the CON and each new generation of security professionals.”

     

    read more
    less
    WRCCDC - UAT Network Security students

    WRCCDC UAT Celebrates 2nd Place Win

    (Mar. 22, 2016)

    Eight Network Security students and Professor Al Kelly loaded up the UAT van on Thursday and set out on a road trip for the Western Regional Collegiate Cyber Defense Competition (WRCCDC) held in Pomona, California, the weekend of March 18-20. The mission of the Collegiate Cyber Defense Competition (CCDC) system is to provide a controlled, competitive environment for institutions with a...

    Eight Network Security students and Professor Al Kelly loaded up the UAT van on Thursday and set out on a road trip for the Western Regional Collegiate Cyber Defense Competition (WRCCDC) held in Pomona, California, the weekend of March 18-20.

    The mission of the Collegiate Cyber Defense Competition (CCDC) system is to provide a controlled, competitive environment for institutions with a Computer Science or Information Security curriculum to assess their student’s depth of understanding and operational competency in protecting a corporate network infrastructure.

    The CCDC competition ask student teams to assume administrative and protective duties for an existing commercial network – typically a medium business with 50+ users, 8 to 16 servers, and common network services such as a web, E-mail and e-commerce. Each team begins the competition with an identical set of hardware and software for their fictitious business and teams are scored on their ability to detect and respond to outside threats, maintain availability of existing services and respond to business requests such as the addition or removal of services or hardware, balancing security needs against business needs.

    Preparing for WRCCDC

    Preparing for WRCCDC

    Throughout the competition an automated scoring engine is used to verify the functionality and availability of each team’s services on a periodic basis while traffic generators continuously feed simulated user traffic into the competition network. A volunteer red team provides the “external threat” that all Internet-based services face and allows the teams to match their defensive skills against live opponents.

    “Going into the competition, students do not know the current condition of the environment. The challenge is to defend the network and keep it up and running as long as possible while bad guys may be trying to hack the system and other issues arise,” said Professor Kelly.

    Eight colleges participated in the WRCCDC including Cal Poly Pomona, UC Berkeley, Stanford, UC Riverside, CSU Dominguez Hills, Riverside City College, CSU Northridge and University of Advancing Technology.

    UAT Network Security students competing at WRCCDC

    UAT Network Security students competing at WRCCDC in Pomona, CA.

    Back at UAT, faculty, staff and students watched the live stream of the WRCCDC event virtually cheering on the team. All weekend, we watched the score as UAT battled for the top 3 positions. Because of the way the challenge is scored, the teams are not in direct competition with each other, but are calculated on the performance of the team.

    UAT took 2nd place and we couldn’t be more proud of the eight students who competed. Thank you to the following Network Security students:

    • Jose Mejia
    • James Olson
    • David Savlowitz
    • Garrett Elkins
    • Roger Brambila
    • Andrew Danis
    • Eric Evans
    • Nicolas Bautista

    Congratulations on a second place win!

     

    read more
    less
    University of Advancing Technology

    UAT to Launch Certificate Programs in Cyber Security and Computer Science Programming

    (Mar. 8, 2016)

    New Career Advancing Opportunities for Cyber Security and IT Professionals University of Advancing Technology (UAT) now offers the option to earn a professional certificate in technology-centric disciplines. These certificate options derived from the reality that local business is starved of...

    New Career Advancing Opportunities for Cyber Security and IT Professionals

    University of Advancing Technology (UAT) now offers the option to earn a professional certificate in technology-centric disciplines. These certificate options derived from the reality that local business is starved of technology talent and as such find themselves having a difficult time scaling for growth. As a long time partner meeting the needs of business demands, UAT is seeking to impact sector growth head-on. These certificate options afford business owners and executives the ability to grow their company while offering employees seeking career advancement opportunities an affordable option to add professional development to their resume.

    UAT President Jason Pistillo said, “UAT understands that a company’s growth can be stifled due to lack of tech talent. In order to be part of the solution, UAT wants to help businesses reach their full potential by nurturing the current technology workforce and by providing the skills employees in tech need to further their careers. Educating and developing existing staff saves employers time and money by offering their employees a new skillset to take their company to the next level.”

    Chief Executive Officer and Chief Technology Officer of Security Horizon, Russ Rogers said, “The potential for an organization to succeed, and even excel, at meeting its goals is becoming much more dependent on the people within the organization who best understand current technologies. Without this understanding, the organization may be lacking the critical technological advantages needed to perform at the highest level, and may be putting their most valuable assets at risk of compromise.”

    UAT’s initial roll out includes options for cyber defense and for software development. Both options offer an intensive courseware for business owners to offer their technology staff in order to learn the most up-to-date information and techniques.

    These comprehensive Certificate Programs offer many benefits to business owners and employees, such as flexible schedules – evening, online and hybrid classes are available to accommodate the working professional, a hands-on and skills-oriented classroom environment taught by industry professionals, and access to all campus resources and technology. Certificate credits earned can be applied to a graduate degree, upon completion of three courses; certificate credits can transfer towards a master’s degree.

    UAT has partnered with Arizona Bank and Trust, who have agreed to assist startup companies by providing funding and financing for a grant to enroll tech employees in the certificate program. For large companies, employers have the ability to request a customized curriculum in an effort to address specific, more tailored needs.

    read more
    less
    UAT Cyber Security students participating in WRCCDC - Please do not disturb!

    Cyber Security Students Take 3rd Place for Injects WRCCDC Qualifier

    (Feb. 2, 2016)

    Last Saturday was extremely busy at UAT. We hosted the UAT Experience, the Phoenix Global Game Jam, and hidden on the second floor in the UAT Cyber Warfare Range, the WRCCDC Qualifier was in progress, as 14 collegiate teams representing California and Arizona competed for the coveted 8 spots for the West Regional Collegiate Cyber Defense Competition (WRCCDC) in March 2016. Last...

    Last Saturday was extremely busy at UAT. We hosted the UAT Experience, the Phoenix Global Game Jam, and hidden on the second floor in the UAT Cyber Warfare Range, the WRCCDC Qualifier was in progress, as 14 collegiate teams representing California and Arizona competed for the coveted 8 spots for the West Regional Collegiate Cyber Defense Competition (WRCCDC) in March 2016.

    Last fall UAT Cyber Security students also participated in the November WRCCDC Invitational, with eight Cyber Security Degree/Network Security Degree students who competed, seven of them participating for the first time.

    Eight UAT cyber security students, plus a White Team judge spent 6 hours defending a virtual business network, which entailed maintaining required services and responding to business related injects, all while keeping the Red Team at bay.

    UAT placed third in Business Injects, successfully earning their spot for one of the eight teams competing at the WRCCDC. UAT is proud of their Blue Team members:

    • James Olson
    • Garrett Elkins
    • Jose Mejia
    • Roger Brambila
    • Andrew Danis
    • Eric Evans
    • David Savlowitz
    • Nicolas Bautista

    Thank you to White Team Judge: Abigail Pfeiffer, UAT Professor of History We have a long way to go, but we will be ready in March 2016! Congratulations team!

    UAT Cyber Security students participating in WRCCDC

    UAT Cyber Security students participating in WRCCDC

    About Western Regional Collegiate Cyber Defense Competition (WRCCDC): Since 2008, our staff, volunteers and sponsors have worked together to make this an interesting, exciting and challenging competition. The winning team from this regional competition will advance to the National Collegiate Cyber Defense Competition (NCCDC) hosted by the University of Texas at San Antonio (UTSA). As we grow the future cybersecurity workforce, the competition is receiving increased attention from government and industry and we expect this attention to increase. We are also very thankful for our industry and professional association sponsors that allow us to provide this unique, hands-on learning experience to college students in the western region.

    read more
    less
    WRCCDC Invitational

    UAT Cyber Security Degree Students Participate in November WRCCDC Invitational

    (Nov. 9, 2015)

    The November Western Regional Collegiate Cyber Defense Competition (WRCCDC) Invitational was held Saturday, November 7, from 10:30 a.m. – 4:30 p.m. UAT had eight Cyber Security Degree/Network Security Degree students complete, seven of them participating for the first time....

    The November Western Regional Collegiate Cyber Defense Competition (WRCCDC) Invitational was held Saturday, November 7, from 10:30 a.m. – 4:30 p.m. UAT had eight Cyber Security Degree/Network Security Degree students complete, seven of them participating for the first time.

    The WRCCDC Invitational is a virtual competition that UAT Cyber Security Degree students were able to attend right from UAT’s Cyber Cave on campus. Here’s what six hours of determination looks like! It actually looks like these guys had fun, too.

    Network Security Faculty Advisor Al Kelly said, “They were great at keeping services up, but need to work on Injects and Red Team Attack responses,” all important skills for finding employment with top security agencies after graduation.

    The Next WRCCDC Invitational will be in December, so they have just over a month to practice.

    Cyber Security Degree students that competed this Saturday.

    • Daniel Howell
    • Garrett Elkins
    • William Peterson
    • Edward Sanchez
    • Arthur Miramontes
    • David Savlowitz
    • Andrew Danis
    • Roger Brambila

    Great work students!

    About Western Regional Collegiate Cyber Defense Competition:

    The Collegiate Cyber Defense Competition (CCDC) system is to provide a controlled, competitive environment for institutions with an information assurance or computer security curriculum to assess their student’s depth of understanding and operational competency in managing the challenges inherent in protecting a corporate network infrastructure and business information systems.

    CCDC competitions ask student teams to assume administrative and protective duties for an existing “commercial” network – typically a small company with 50+ users, 7 to 10 servers, and common Internet services such as a web server, a mail server, and an e-commerce site.

    Each team begins the competition with an identical set of hardware and software for their fictitious business and teams are scored on their ability to detect and respond to outside threats, maintain availability of existing services such as mail servers and web servers, respond to business requests such as the addition or removal of additional services, and balance security needs against business needs.

    Throughout the competition an automated scoring engine is used to verify the functionality and availability of each team’s services on a periodic basis while traffic generators continuously feed simulated user traffic into the competition network. A volunteer red team provides the “external threat” that all Internet-based services face and allows the teams to match their defensive skills against live opponents.

    www.wrccdc.org

     

    read more
    less
    Cyber Security Degree at UAT

    First Cyber Security Degree College in Arizona Marks 15 Years of Elite Graduates

    (Oct. 1, 2015)

    Originating and leading cyber security degree education in Arizona, University of Advancing Technology (UAT) is marking 15 successful years since the inception of its elite ...

    Originating and leading cyber security degree education in Arizona, University of Advancing Technology (UAT) is marking 15 successful years since the inception of its elite Network Security degree program.

    The longest-running cyber security degree program in the state has prepared more graduates from a NSA- and CAE-credentialed education than any other university’s cyber program in Arizona. As a result, they have taken their place among the nation’s top cyber security professionals and help to meet growing demand that recently surpassed 200,000 job openings.

    Prior to cyber security becoming part of the U.S. vocabulary, UAT launched the Network Security degree, now commonly referenced as a cyber security degree, in partnership with industry and government.

    UAT recognized the importance of training cyber security experts, beginning in 2000, ahead of the groundswell of online hacking and corruption. They also understood the necessity of having cyber security professionals, more educated and “street smart” than the “black hats,” for the country’s counter terrorism entities within the DoD, NSA, CIA and other government agencies looking to build their defense against network espionage.

    Network Security students learning skills in a Capture the Flag challenge in the UAT Cyber Warfare Range

    Network Security students learning skills in a Capture the Flag challenge in the UAT Cyber Warfare Range

    UAT’s cyber security degree is designed to educate the industry’s elite, ethical hackers as the next generation of cyber security professionals, commonly referred to as “white hat” hackers focused on earning the credentials necessary to be respected leaders helping to protect our nation’s assets.

    Designated as a Center for Academic Excellence in Information Assurance Education (CAE/IAE) by the U.S. National Security Agency (NSA), UAT’s cyber security program and cyber lab are recognized by industry and government entities alike for their ability to generate the future industry innovators of the cyber security industry – leaders who will have mastery in ethical hacking and uphold the highest industry standard of integrity in our quickly evolving world of technology and online security.

    Cyber Warfare Range at University of Advancing Technology

    Cyber Warfare Range at University of Advancing Technology

    “Our established NSA and FBI relationships have fostered the creation of a comprehensive curriculum that assures the high integrity and preparedness of graduates,” says Dr. David Bolman, UAT Provost. “As testimony to this, the NSA conducts annual visits to campus to recruit our best graduates. This top national cyber security degree is right here, in Arizona’s backyard.”

    “Our program isn’t simply books and labs,” says Russ Rogers, UAT Network Security program champion and one of the industry’s foremost experts. “Our students are working actively in faculty-driven internships, providing quality security services for real-world companies.” For example, Professor Rogers currently is mentoring students in an NTS internship program, where they are doing programmatic and technical work for Beth Israel Deaconess Medical Center.

    Real-world learning also occurs in UAT’s DoD-funded, state-of-the-art cyber security cave and at the world’s largest ethical hacking events. Connected to the industry, Professor Rogers is one of the national organizers of the annual DEF CON hacker conference who manages volunteers at both Black Hat and DEF CON.

    In fact, UAT was the only university given the chance to have their cyber security students volunteer at this year’s Black Hat. Every year, UAT has a massive presence of faculty and students working together at each DEF CON and Black Hat event.

    Black Hat volunteers

    UAT Cyber Security students working as Black Hat volunteers

    UAT’s impact is recognized in the industry. Clarence McAllister, CEO at Fortis Networks, states, “As a federal government contractor, I acknowledge UAT’s contributions in educating the best cyber security professionals in the industry. As a result, the nation now has access to highly qualified security experts.”

    “We’re proud to play a leading role in educating premier students to fill critical positions that help build and maintain our national and global security infrastructure,” says Jason Pistillo, UAT President and founding board member of Security Canyon, Arizona’s Cyber Security Coalition. “Since tech is all we do, our technology university has the elite status of being among a select few 100 percent STEM-based universities in the nation.”

    UAT began more than 30 years ago, at the dawn of the computer age, with advancing technology degrees that soon after included Arizona’s original cyber security degree. It quickly became one of the most respected network security degrees among industry and government entities alike, which resulted in UAT becoming Network Security Curriculum Certified. Today, the technology college’s advancing technology degrees include a full continuum of residential and online cyber security and technology forensics degrees.

    UAT continues its commitment to educating the next generation of elite professionals practicing digital citizenry in degree programs, including prestigious undergraduate cyber security degrees in Network Security, Network Engineering, and Technology Forensics, and the elite graduate degree in Information Assurance transporting graduates to the leading edge of industry.

    Hundreds of graduates from UAT’s center for cyber security have gone on to become esteemed alumni and respected professionals in their fields as a result of the essential knowledge and tools they gained – many working at the highest levels of commerce, industry, and national security.

    Learn more here: UAT | Cyber Security Degrees

    read more
    less
    Black Hat volunteers

    Cyber Security Students Volunteer at Black Hat & DEF CON

    (Aug. 14, 2015)

    A group of UAT Network Security students and alumni were given the chance to participate in Black Hat USA 2015 as paid volunteers and were also granted free access to DEF CON 23. Black Hat is a security conference designed to attract people of all walks of life such as corporate businesses, government agencies,...

    A group of UAT Network Security students and alumni were given the chance to participate in Black Hat USA 2015 as paid volunteers and were also granted free access to DEF CON 23.

    Black Hat is a security conference designed to attract people of all walks of life such as corporate businesses, government agencies, military, the private sector and independent security experts. This year, Black Hat USA 2015 was held at the Mandalay Bay Resort and Casino in Las Vegas, from Aug. 1-6.

    Thanks to UAT Net Sec Professor Russ Rogers, UAT was the only university given the chance to volunteer at Black Hat. Professor Rogers manages the volunteers at both Black Hat and DEF CON, and therefore UAT held a massive presence at each event.

    Professor Russ Rogers with Will Peterson (student) at DEF CON

    Professor Russ Rogers with Will Peterson (student) at DEF CON

    More than 40 Network Security students and alumni were put to work at Black Hat with tasks such as setting up the network, placing network cables down, setting up APs (access points or wifi connections), setting up switches and routers, setting up the Network Operations Command (NOC), crowd control, collecting completed documents, classroom presentation support, customer assistance and problem solving when needed.

    Although the student volunteers were kept busy during the conference, they were rewarded with a free room and meals, a paycheck, great experience and many opportunities to network with prospective employers such as LifeLock, Offensive Security, Raytheon and Booz Allen Hamilton. While talking with executives at these major companies, some students received invitations to private networking parties for a more in-depth networking opportunity.

    While at Black Hat, a small group of UAT students received a private invitation to Booz Allen Hamilton’s Kaizen Capture the Flag (CTF) Challenge on Aug. 5. This was pure excitement for the hacker group from UAT.

    William Peterson, a junior enrolled in the Network Security program said, “Being involved in Black Hat and DEF CON was a valuable experience. I was a first-time volunteer who got the chance to speak with prospective employers, partake in a an invitational-only CTF and I even got to be a Goon at DEF CON! What a great trip.”

    Invite-only Capture the Flag (CTF) Challenge

    Invite-only Capture the Flag (CTF) Challenge by Booz Allen Hamilton

    Other UAT volunteers found time to attend a few of the Black Hat Briefings to learn about current industry trends in security.

    Once Black Hat came to an end, the UAT student volunteers were headed to DEF CON 23! Because both security conferences fall on the same week, in the same city, many people attend both Black Hat and DEF CON.

    Network Security students working at Black Hat

    Network Security students working at Black Hat

    You will find that DEF CON is a little more edgy than Black Hat. DEF CON was created in 1993 by a core hacker group who wanted to explore and practice technology. Today, DEF CON’s audience is more diverse with corporate businesses and government types in attendance, as well. This event is more about the practice of hacking and finding new ways to infiltrate security. The security talks are a bit more edgy and may practice and discuss topics like vehicle hacking. This year Tesla held a car hack demo to see if anyone could hack into the car’s security system. Yes they were able to crack it, but Tesla was ready to create a patch in order to avoid recalling many cars in circulation.

    The UAT volunteers were also put to work at this conference. First they began helping out at the Information Booth and then some were asked to help out DEF CON security, also known as Goons. Crowd control at event this large is important and all attendees know to respect the Goons – OR ELSE!

    DEF-CON-map

    Map of DEF CON

    Students also participated in the Open CTF at DEF CON. They feel they performed well, but it takes a lot to make it to the DEF CON CTF Qualifier. Maybe next year!

    One thing is true about DEF CON, these people are extremely passionate about hacking. It’s not just a hobby, but a passion and DEF CON is where these like-minded people can gather for events like CTF Challenges, the Lock Picking Village, the Tesla Car Hack Challenge and more.

    If you are a UAT Net Sec student and you missed out this year, be on the lookout next summer when Black Hat is looking to hire paid volunteers! This experience is a wonderful resume builder and it could even present opportunities that you had never considered!

    More DEF CON Articles:

    Connect with UAT Network Security Professor Russ Rogers on LinkedIn.

     

     

    read more
    less
    proxyham-100596165-primary.idge

    DEF CON Talk Cancelled

    (Jul. 13, 2015)

    Each year at DEF CON, we receive a huge number of submissions. While most of them are interesting to some portion of our attendee population, there are normally a few talks that seem to have mass appeal. This year, DEF CON received a submission from Ben Caudill about a technology he had created, called Proxy Ham. The concept was simple; increase the anonymity and privacy of a user by creating...

    Each year at DEF CON, we receive a huge number of submissions. While most of them are interesting to some portion of our attendee population, there are normally a few talks that seem to have mass appeal. This year, DEF CON received a submission from Ben Caudill about a technology he had created, called Proxy Ham. The concept was simple; increase the anonymity and privacy of a user by creating a device that allows a remote connection that can’t easily be traced back to the user.

    The device was designed around a Raspberry Pi, and included wireless interfaces in the normal wifi range, and the 900 MHz range. This is an important distinction because the remote connection via 900 MHz allows a user to connect to the device up to 2 miles away. The wifi connection is used to associate with a wireless access point, somewhere in local area. The assigned IP address would be assigned to the Proxy Ham, not the user, so tracing the connection back to the user would be difficult.

    But the presenter abruptly pulled the plug on his talk, leaving many scratching their heads. Was this a Federal intervention? What if the FCC was concerned about the use of radio frequencies that normally require an approved license? Could it have been a concern about the use of the device as a mechanism for terror? Or was it just pulled because of financial reasons? It wouldn’t be the first time a company has gotten in the middle a presentation like this, to protect their perceived interests.

    Regardless of the real reason, the talk has been pulled, and all details about its existence have started to disappear. It would be great to hear more about what’s happened, and I’d like to see more research on this topic, by other groups. But in the end, DEF CON has lost some interesting content.

    read more
    less
    Network Security students learning skills in a Capture the Flag challenge

    Cyber Security Degree Students Capture The Flag For Ethical Hackers

    (Jul. 10, 2015)

    UAT Network Security students who belong to ethical hacking group ‘Layer8′ have began an intense 3-day worldwide challenge of Capture the Flag (CTF), hosted virtually in Milan, Italy. This is not your childhood game of hiding a red bandana from your opponent in the woods. This CTF requires the team to solve security-related challenges in Cryptography, Forensics, Reverse...

    UAT Network Security students who belong to ethical hacking group ‘Layer8′ have began an intense 3-day worldwide challenge of Capture the Flag (CTF), hosted virtually in Milan, Italy. This is not your childhood game of hiding a red bandana from your opponent in the woods.

    This CTF requires the team to solve security-related challenges in Cryptography, Forensics, Reverse Engineering, Pwning (exploiting weaknesses), Web Hacking and a Grab Bag of miscellaneous tasks.

    The purpose of this CTF is to help security people look at problems differently and determine the techniques and skills that are needed industry wide. There are also prizes awarded to the winners such as Oculus Rifts and Raspberry Pis, but the guys in Layer8 are doing it for the experience and for fun.

    Layer 8

    Layer8 – Steve Chicosky and Ian Guile working on CTF Challenges

    When on the job search, Steve Chicosky said, “Companies are starting to ask if we do these CTF challenges. Some people think these things are easy and they are definitely not.”

    Layer 8 consists of UAT students Kenny Welch, Ian Guile, Will Peterson and UAT alumnus Steve Chicosky. These students will volunteer at the upcoming network security convention BlackHat in Las Vegas, and attend DEF CON the week after. At DEF CON, they plan to participate in another CTF challenge under the group Layer8.

    Each year DEF CON hosts a huge CTF event for hacker teams to compete in, it’s like the Superbowl of CTF. Winners of the CTF contest receive a black badge to attend DEF CON for life. Like Steve said it’s not as easy as you’d think!

    You can learn more about Network Security and ethical hacking here: www.uat.edu/network-security-degree

     

    read more
    less
    DEF CON

    5 Things You May Not Know About DEF CON

    (Jul. 3, 2015)

    DEF CON is one of the world’s largest annual hacker conventions, held every year in Las Vegas, since its inception in June 1993. The special sauce to DEF CON is that growth is largely organic and unplanned. As the conference has evolved, DEF CON has adopted the input and great ideas for content and events from many of the attendees and staff. DEF CON attendees can expect to see...

    DEF CON is one of the world’s largest annual hacker conventions, held every year in Las Vegas, since its inception in June 1993. The special sauce to DEF CON is that growth is largely organic and unplanned. As the conference has evolved, DEF CON has adopted the input and great ideas for content and events from many of the attendees and staff.

    DEF CON attendees can expect to see computer security professionals, journalists, lawyers, federal government employees, security researchers, and hackers interested in computer architecture, phone phreaking, hardware modification, and anything else that can be “cracked.”

    The event consists of several industry speakers, as well as social events and contests, such as creating the longest Wi-Fi connection and cracking computer systems, to who can most effectively cool a beer in Nevada’s summer heat. So many things are happening simultaneously at DEF CON, that even conference founder Jeff Moss, a.k.a. The Dark Tangent, can’t keep up.

    A group of UAT student volunteers will return to the conference this year, so we decided to seek out five things that you probably didn’t know about DEF CON.

    UAT at DEF CON

    UAT at DEF CON 22

    Luckily, we have a few lesser-known facts from UAT Network Security Professor Russ Rogers, who helps run DEF CON each year.

    1. There are actually only a few full-time employees of DEF CON. The rest of the staff is long time hackers, who provide their time, help, and advice in order to maintain the high quality of the conference.
    2. BEWARE! A DEF CON tradition is the Wall of Sheep, which is a website that shows the usernames, IP addresses, hostnames, and protocol used by people who got their passwords sniffed while using the wireless network.
    3. DEF CON 5 was featured in The X-Files episode “Three of a Kind” featuring an appearance by The Lone Gunmen.
    4. DEF CON holds a Scavenger Hunt competition held every year, to see who can hack their way to get the most odd items within 3 days. READY. SET. HACK!
    5. The DEF CON Black Badge is awarded to elite winners of DEF CON competitions. Those chosen to receive a Black Badge are able to enter DEF CON free of charge for life. The only contest guaranteed to receive a black badge prize, when the conference starts, is Capture the Flag. The other black badge contests are chosen during the conference, based on popularity, cool factor, and participation.

    DEF CON 23 runs Aug. 6-9, at Paris and Bally’s in Las Vegas.
    www.defcon.org

    Visit UAT’s booth at DEF CON for some awesome swag and to learn more about a degree in Network Security.
    www.uat.edu/network-security-degree

     

    read more
    less
    battlebots

    Recent TV Programing Correlates to UAT Degrees

    (Jun. 24, 2015)

    Television has recently shined a light on two exciting majors offered at University of Advancing Technology: Robotics and Embedded Systems and ...

    Television has recently shined a light on two exciting majors offered at University of Advancing Technology: Robotics and Embedded Systems and Network Security. You heard me right! Hit the DVR and let’s see what these shows are all about.

    BattleBots – Sundays at 9 p.m. on ABC

    The premise: The homemade robots will battle against each other, in a single elimination tournament style format, until there is just one champion.

    The new series promises to wow viewers with next generation robots—bigger, faster and stronger than ever before.

    The show will have a greater emphasis on the design and build elements of each robot, the bot builder backstories, their intense pursuit of the championship and the spectacle of the event. Separate weight classes will be eliminated so that robots of all sizes will battle against each other.

    State of the Art Onboard Technology and Cameras will provide audiences with enhanced viewing and combat analytics. There will be cash prizes for winners in the Championship Rounds.

    See a video clip from episode 1: Nightmare vs. Warrior Clan: Qualifiers

    In BattleBots, 24 of the best robot builders on Earth have set out to compete in the most epic robot competition of all time and our robotics students won’t want to miss it!

    BattleBots relates to the Robotics and Embedded Systems Degree offered at UAT.

    Learn more about a future in robotics at www.uat.edu.

    Mr. Robot – Wednesdays at 10 p.m. on USA Network

    In MR. ROBOT, Elliot, a young programmer who works as a cyber-security engineer by day and vigilante hacker by night, is recruited by a mysterious underground group to destroy the firm he’s paid to protect. Elliot must decide how far he’ll go to expose the forces he believes are running (and ruining) the world.

    “Sometimes the only way to change the world is to tear it down.”

    Mr Robot

    Mr Robot premiers Weds., June 24, on USA Network

    Mr. Robot has themes similar to UAT’s Bachelor of Science Network Security or Bachelor of Science Network Engineering degrees. Elliot probably took an ethics class to keep him on the straight and narrow, which is offered as part of the curriculum in these majors.

    Find your place in technology at UAT!

    www.uat.edu

     

    read more
    less
    Black Hat 2015

    Volunteers Needed For Black Hat Briefings This Summer

    (Jun. 11, 2015)

    The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world – from the corporate and government sectors to academic and even underground researchers. Black Hat remains the best...

    The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world – from the corporate and government sectors to academic and even underground researchers. Black Hat remains the best and biggest event of its kind, unique in its ability to define tomorrow’s information security landscape.

    Black Hat is being held at Mandalay Bay in Las Vegas, from Aug. 1-6, 2015. UAT Students can get the experience of a lifetime by applying to volunteer at Black Hat this year.

    Click this link to submit your application: https://cfp.blackhat.com/volunteers/new

    This is a great opportunity for UAT students to get involved and have something really cool to add to your resume!

     

    read more
    less
    Technology

    What Would Be Great To Do Next

    (Jun. 10, 2015)

    A couple weeks ago I spoke to the UAT graduating class and in that message I referred to the implications of living in and building upon the current world landscape. Specifically I pointed to the accomplishment of creating a universal access to the Internet and computing resources that is now deeply woven into our daily lives. This was the great and admirable work of the previous generation....

    A couple weeks ago I spoke to the UAT graduating class and in that message I referred to the implications of living in and building upon the current world landscape. Specifically I pointed to the accomplishment of creating a universal access to the Internet and computing resources that is now deeply woven into our daily lives. This was the great and admirable work of the previous generation. And while there is still plenty (lifetimes) of work left to be done in this area, we have breathing room to ask the question – What is next?

    When I think about what to focus upon going forward, it is hard to not to put applying technology towards sustainability high on the list. It is certainly time for our species to get good at taking cross-generational care of our world. Just as in the past, tech is certainly going to play a defining role in working out those needed solutions. Equipped by our newfound connectivity, humans are creating data and knowledge in amounts that are not only historic, but also a bit mind-bending. Becoming masters at knowing how to look at this data and knowledge certainly seems like a path towards solving complex problems such as sustainability and routinely generating healthy lives for all members of our planet. Because the opportunity to solve these hard puzzles is so very close, tools that allow all humans to clearly see and use the vast information we are creating must happen. Along this path, I can also see and hope for us to re-engage on great moments of exploration. As I consider the future and all the very real technologies and individualistic new ‘kickstarters’ now in play, I love the thought that we truly are on the edge of a new generation’s version of the nautical, polar and lunar expansions of human presence that highlighted our past.

    Equally as likely and needed as a focus is ensuring that the computing and information infrastructure that serves as the foundation of the future remains in place and that our information and intellectual property remains secure and trustworthy. This week’s cyber attack by China is a fraction of the attacks that occur each day. A dramatic increase in the number of attacks is fully anticipated for 2015, the next year, the one after that and on and on and on. As a matter of national and personal security and to ensure the integrity of our innovation platform, the U.S. needs far more cyber professionals than we have pipelined. According to the NSF, our country is producing only about 2/3 the number of IT professionals that we need and of that number, fewer than 10% are trained in cyber defense. Considering how dependent our economy, infrastructure and lives are on Internet and Cloud technologies, if you wanted to put a topic on the short list of genuine priorities for the country – increasing the number of trained cyber defense professionals should be on that list.

    Winding these human and technology focal points together, it is in no way a stretch to plan for a near future where gatherings of science, technology and exploration re-emerge. Wouldn’t it be wondrous if they become the enthusiastic focus of everyone’s conversations and recast humanity in the way that parallels how computing did over the last set of decades. I am glad that we are together for this work. It is the among the best that we could hope for and to be a part of.

    -Dr. Dave Bolman, Provost

     

    read more
    less
    Matrix

    Can We Understand Massive Security Data?

    (Jun. 1, 2015)

    Security software and technology are evolving rapidly, allowing security systems to collect and correlate more data about the inner workings of our network and computing systems, than ever before. But nearly no progress has been made in areas relevant to data visualization; which are key to allowing users to comprehend the vast amount of data collected. This puts at risk our ability to...

    Security software and technology are evolving rapidly, allowing security systems to collect and correlate more data about the inner workings of our network and computing systems, than ever before. But nearly no progress has been made in areas relevant to data visualization; which are key to allowing users to comprehend the vast amount of data collected. This puts at risk our ability to understand the key information required to make important decisions related to protecting our data assets. To put this simply, we’re using cutting edge technology to collect security data that we aren’t truly able to fully understand. Without this last piece, how useful are these technologies?

    Human Computer Interaction (HCI) has routinely been presented as the methods and means a user interacts with, to control a computer system. I would argue, however, that this interaction must be presented in a bi-directional methodology. Using an application in an intuitive manner is great, but if the data can’t be understood, then we have failed at the second layer of our problem. We need to present these volumes of data in a manner that make that data more intuitive.

    So, what’s the problem we face? Historically, we’ve fallen into a static method of presenting security data feeds in a spreadsheet style. Consider the most popular security software application. If you look at intrusion detection, network monitoring, vulnerability scanners, network traffic analyzers, or firewall software, you’ll immediately visualize boxed line after boxed line of data. This is great organization for a computer, because the computing power of the CPU allows the computer to move quickly through this data. The human brain doesn’t work like that, and many people may move through these tomes of data at a snail’s pace.

    sguil

    A common event screen from security software.

    As college graduates, it’s important to you to be as useful to your first job organization, as quickly as possible. If you’re stepping up from using a basic lab style network, to a large corporation with 10k network nodes, the difference in data flow will normally be overwhelming. Our goal: Improve the HCI bi-directional interaction, and enable more immediate comprehension of complex data structures.

    My current research is based on understanding video game development concepts. My rationale for this is fairly simple. If you’ve ever walked into a room, when a young child has first been placed in front of a new video game, you’ve likely seen how quickly they assimilate the complex concepts of how the game works, and the actions they need to take, to successfully manage the game environment.

    In recent conversations, between myself and UAT Game Programming Program Champion, Derek Clark, he’s referred to this process as the gamification of complex, non-game software. In short, if we can use proven methods for interaction and data conveyance, we can improve the performance of novice and veteran security professionals. As you work your way through your security education, I urge you to consider new methodologies for presenting information, and allowing users to interact with applications you may be creating. Additionally, be sure to keep up with Derek Clark’s blog posts, so you can stay up-to-date on the latest technology with the game development world. In the war to defend our data from attackers, we need every tool and advantage we can get our hands on. In this case, we may have tools available, and there’s no real reason for us to recreate the wheel.

    -Russ

    read more
    less
    DEF CON 2015

    DEF CON 23

    (Jun. 1, 2015)

    DEF CON is one of the oldest and largest continuously running hacker conventions around. UAT is making yet another appearance at DEF CON to connect with alumni as well as many like minded technology-driven individuals. Originally started in 1993 by The Dark Tangent, DEF CON is a...

    DEF CON is one of the oldest and largest continuously running hacker conventions around. UAT is making yet another appearance at DEF CON to connect with alumni as well as many like minded technology-driven individuals.

    Originally started in 1993 by The Dark Tangent, DEF CON is a unique experience for each con-goer. Virtually all events at DEF CON were conceived by the attendees. Some people play capture the flag 24×7, while many people never touch a computer at DEF CON. Some people see every speech they can, while others miss all speeches. Other activities include contests, movie marathons, scavenger hunts, sleep deprivation, lock picking, warez trading, drunken parties, spot the fed contest, the official music events. Because DEF CON is what the attendees make of it, there are more events than even we are aware of.

    UAT at DEF CON

    UAT at DEF CON

    The UAT booth was a popular spot last year with our selection of witty t-shirts, tech swag and information on attending UAT to study Cyber Security.

    Remember to only bring cash unless you don’t mind having your credit cards compromised by thousands of hackers. Use care when attempting to access wireless Internet during DEF CON, many hackers are looking for you to login to their network and cause some serious damage to your systems. It’s suggested to not bring or use smartphones, credit cards, laptops, etc to this conference, it’s not worth the risk. Those brave souls who have tried, usually find themselves being blasted on the Wall of Sheep.

    What are Goons? They are the staff at DEF CON. They have many roles including safety, speaker coordination, vendor room coordination, network operations, et cetera. Please try to be helpful to them if they make requests of you. If any goon tells you to move, please do so immediately as there may be safety issues they are attempting to address.

    There have been roughly 12,000-13,000 attendees in the last few years of DEF CON. DEF CON 22 had a record showing with over 14,500. We can only imagine how many will attend DEF CON this year.

    DEF CON 23 takes place Aug. 6-9, at Paris and Bally’s in Las Vegas.

    www.defcon.org

     

    read more
    less