• CONSULTING SERVICES
    • Application Penetration Testing
    • Mobile Application Assessment
    • Hybrid Application Assessment
    • Red Teaming
    • Internal Penetration Testing
    • External Penetration Testing
    • Product Security Review
  • MANAGED SERVICES
    • Continuous Attack Surface Testing (CAST)
    • How CAST Works
    • CAST Use Cases
  • PARTNER PROGRAMS
    • Alexa Built-In Devices Assessment
    • Google Partner Security Assessment
    • Nest Partner Security Assessment
    • Workplace Security Assessment
Bishop Fox
  • LABS
    • Labs Home
    • Research & Tools
    • About Labs
    • Industry Blog
    • Tech Blog
    • Advisories
  • ABOUT
    • About Us
    • Customer Stories
    • Careers
    • Open Positions
    • Internships
    • Fox Tales Blog
    • News
    • Events
  • CONTACT
Bishop Fox
  • CONSULTING SERVICES
    • Application Penetration Testing
    • Mobile Application Assessment
    • Hybrid Application Assessment
    • Red Teaming
    • Product Security Review
    • External Penetration Testing
    • Internal Penetration Testing
  • MANAGED SERVICES
    • Continuous Attack Surface Testing
    • How CAST Works
    • CAST Use Cases
  • PARTNER PROGRAMS
    • Alexa Buit-In Devices Assessment
    • Google Partner Security Assessment
    • Nest Partner Security Assessment
    • Workplace-Facebook Security Assessment
  • LABS | RESEARCH & TOOLS
    • Research & Tools
    • Tech Blog
    • Industry Blog
    • Advisories
  • CAREERS
    • Open Positions
    • Internships
    • Fox Tales Blog
  • ABOUT
    • Customer Stories
    • News
    • Events
  • CONTACT
Bishop Fox News & Articles
  • News
  • Press Releases
  • Articles
  • Awards

Arizona Republic - Mesa Event to Focus on Computer Basics, Internet Security

Posted on Sep 15, 2018 11:48:31 AM

Share on facebook Share on linkedin Share on twitter
To go to the article, click here.
 

If you want to learn more about internet security or are interested in a career in cybersecurity, the Arizona Republic highlights the largest annual hacker and security conference in Arizona, CactusCon, in their article - Want to learn how to hack? Mesa event to focus on computer basics, internet security.

CactusCon 2018, held September 28-29 in Mesa, AZ, is expected to attract 2000+ attendees from throughout the entire country and will feature talks on topics such as red teaming, cryptomining, AWS, training just to name a few. The CactusCon CTF competition will run from 9AM to 6PM on Friday, September 28. Workshops will feature web hacking, cryptography, powershell scripts, and there will be a lockpick village set up. CactusCon Kids is a separate area with learning activities for ages 8-17.

Bishop Fox is proud to be a conference sponsor and Senior Security Associate Joe Ward will present Anatomy of an AppSec Program; OR How to Stop Deploying Shoddy Code to Production Systems at CactusCon on Saturday, September 29 at 11:00 AM.

 

Topics:News
Share on facebook Share on linkedin Share on twitter

Comments

Submit a Media Request

Please get in touch with our PR Team for any press or PR related inquiries.

Email: contact@bishopfox.com

  • Recent
  • Topics
  • Archive

  • Articles (393)
  • Author - Bishop Fox (6)
  • Author - Brianne Hughes (2)
  • Author - Dan Petro (1)
  • Author - Daniel Wood (3)
  • Author - Jake Miller (1)
  • Author - Oscar Salazar (1)
  • Author - Rob Ragan (1)
  • Author - Vincent Liu (3)
  • Awards (15)
  • Board of Directors (1)
  • Eyeballer (2)
  • News (668)
  • Press Releases (46)
  • Research - GitGot (1)
  • Topic - Award (1)
More...

  • July 2014 (39)
  • July 2015 (34)
  • February 2015 (19)
  • April 2015 (19)
  • October 2017 (19)
  • February 2014 (17)
  • August 2014 (17)
  • April 2016 (16)
  • July 2013 (15)
  • August 2016 (15)
  • March 2018 (15)
  • September 2019 (15)
  • January 2017 (14)
  • January 2020 (14)
  • February 2019 (13)
  • July 2020 (12)
  • April 2018 (11)
  • August 2019 (11)
  • June 2020 (11)
  • June 2014 (10)
  • July 2016 (10)
  • August 2017 (10)
  • February 2018 (10)
  • February 2020 (10)
  • May 2019 (9)
  • October 2019 (9)
  • August 2020 (9)
  • June 2013 (8)
  • October 2013 (8)
  • October 2016 (8)
  • March 2017 (8)
  • January 2019 (8)
  • March 2019 (8)
  • March 2020 (8)
  • August 2012 (7)
  • May 2014 (7)
  • August 2015 (7)
  • February 2017 (7)
  • July 2017 (7)
  • April 2020 (7)
  • December 2020 (7)
  • March 2013 (6)
  • December 2013 (6)
  • April 2014 (6)
  • September 2014 (6)
  • November 2017 (6)
  • May 2018 (6)
  • July 2018 (6)
  • September 2018 (6)
  • February 2013 (5)
  • August 2013 (5)
  • January 2014 (5)
  • October 2014 (5)
  • September 2016 (5)
  • June 2017 (5)
  • September 2017 (5)
  • December 2017 (5)
  • April 2019 (5)
  • November 2019 (5)
  • September 2013 (4)
  • November 2013 (4)
  • December 2014 (4)
  • March 2016 (4)
  • June 2016 (4)
  • April 2017 (4)
  • May 2017 (4)
  • January 2018 (4)
  • June 2018 (4)
  • December 2019 (4)
  • October 2020 (4)
  • August 2007 (3)
  • October 2011 (3)
  • March 2014 (3)
  • November 2014 (3)
  • February 2016 (3)
  • December 2016 (3)
  • August 2018 (3)
  • October 2018 (3)
  • December 2018 (3)
  • June 2019 (3)
  • September 2020 (3)
  • July 2012 (2)
  • October 2012 (2)
  • May 2013 (2)
  • September 2015 (2)
  • October 2015 (2)
  • November 2018 (2)
  • May 2020 (2)
  • March 2006 (1)
  • November 2006 (1)
  • March 2007 (1)
  • May 2007 (1)
  • June 2007 (1)
  • September 2007 (1)
  • April 2008 (1)
  • December 2008 (1)
  • December 2009 (1)
  • July 2010 (1)
  • June 2011 (1)
  • March 2012 (1)
  • September 2012 (1)
  • November 2012 (1)
  • December 2012 (1)
  • April 2013 (1)
  • May 2015 (1)
  • June 2015 (1)
  • November 2015 (1)
  • December 2015 (1)
  • November 2016 (1)
  • July 2019 (1)
  • November 2020 (1)
  • January 2021 (1)
More...

Subscribe to Updates

MANAGED SERVICES

  • Continuous Attack Surface Testing (CAST)
  • How CAST Works
  • CAST Use Cases

CONSULTING SERVICES

  • Application Penetration Testing
  • Mobile Application Assessment
  • Hybrid Application Assessment
  • Red Teaming
  • Product Security Review
  • External Penetration Testing
  • Internal Penetration Testing

PARTNER PROGRAMS

  • Alexa Built-In Devices Assessment
  • Google Partner Program
  • Nest Partner Program
  • Workplace Partner Program

LABS | RESEARCH & RESOURCES

  • Research & Tools
  • Advisories
  • Tech Blog
  • Industry Blog
  • Vulnerability Disclosure Policy

CAREERS

  • Careers
  • Open Positions
  • Internships
  • Fox Tales

COMPANY

  • About Us
  • Customer Stories
  • News
  • Events

COMMUNITY

  • All Blog Posts

CONTACT

  • 1 480 621 8967
  • Contact@BishopFox.com

ADDRESS

8240 S. Kyrene Rd.
Suite A113
Tempe, AZ
85284
United States

Copyright © 2021   Bishop Fox Privacy Statement