Theme Selector
Filter by
No Results Found, Please Adjust Your Search
ai
Autonomous Timeline Analysis and Threat Hunting
DEF CON 33 2025
ai
FACADE High-Precision Insider Threat Detection Using Contrastive Learning
BH25 2025
ai
Autonomous Timeline Analysis and Threat Hunting
BH25 2025
AI
Toward Secure & Trustworthy AI: Independent Benchmarking
InCyber Forum 2025
AI
AI for Cybersecurity: Get Started Today
Sectember AI 2024
AI
AI Security: Top 5 Recommendations To Get Started Today
DevFest 2024
AI
Lessons Learned from Developing Secure AI Workflows at Google
RSA 2024
AI
How Large Language Models Are Reshaping the Cybersecurity Landscape
RSA 2024
cybersecurity
How AI helps keeping Gmail inboxes malware free
FIC 2023
cybersecurity
Building Safe End-to-End Encrypted Services for Business - a Google Workspace perspective
RSA 2022
cybersecurity
Deep-Cryptanalysis - Fashion or Revolution?
WAC 2021
security
Account protections - A Google Perspective
FIC 2020
cryptography
A Hacker’s guide to reducing side-channel attack surfaces using deep-learning
Defcon & BH 2020
security
Malicious Documents Emerging Trends: A Gmail Perspective
RSA 2020
cryptography
A Hacker Guide To Deep Learning Based Side Channel Attacks
Defcon 2019
anti-abuse
Deconstructing the Phishing Campaigns that Target Gmail Users
Black Hat USA 2019
ai
Cutting Edge TensorFlow - Keras Tuner: hypertuning for humans
IO 2019
ai
Rethinking how to detect child sexual abuse imagery on the Internet
Enigma 2019
ai
How to successfully harness AI to combat fraud and abuse
RSA 2018
network security
Hunting down Gooligan — retrospective analysis
Botconf 2017
hacking
Attacking encrypted USB keys the hard(ware) way
Black Hat USA 2017
security
Tracking ransomware payments end to end
BH USA 2017
security
How we created the first SHA-1 collision and what it means for hash security
Black Hat 2017
web security
Learn web security with Google
IO 2016
security
Targeted Attack Against Corporate Inboxes A Gmail Perspective
RSA 2017
hacking
Cheating at poker - James Bond Style
Defcon 2016
hacking
Does dropping usb drives really work?
Black Hat 2016
security
Lessons learned while protecting Gmail
Enigma 2016
video game
I am a legend: hacking hearthstone with machine learning
Defcon 2014
video game
Fuzzing online games
Defcon 2012
web security
The Art of Breaking and Designing CAPTCHAS
RSA 2012
hacking
Beyond files recovery owade cloud-based forensic
Black hat 2011
video game
Kartograph
Defcon 2010
hacking
Bad memories
Black Hat & Defcon 2010
security
Reversing dpapi and stealing windows secrets offline
Black Hat DC 2010
hacking
Embedded management interfaces emerging massive insecurity
Black Hat 2009