Monday, September 29, 2008
Another six months has passed – must be time for BlueHat, Microsoft’s internal security conference. This one is shaping up to be an interesting one. The early BlueHats were all about the raw technology – Shok blowing out the memory manager, Brett Moore facepalming over yet another file format vulnerability. But determining vulnerability requires more than just understanding technology.