06-20-2015 Docker, HackmiamiBT

Docker Docker is a tool that can package an application and its dependencies in a virtual container that can run on any machine. This helps enable flexibility and portability on where the application can run, whether on-premise, public cloud, private cloud, bare metal, etc. We will have a hands-on session on Docker, and take a […]

Dave Monnier of Team Cymru Keynote Speaker

Dave Monnier is a Fellow and the Director of Threat Intelligence and Outreach at Team Cymru. Understanding that real-world security involves both technology and business considerations, Dave helps organizations to fully consider their security and policy decisions in real-world terms. Dave has traveled the world presenting security ideas and solving organizations hardest problems. With over […]

DigitalGuardian Lists Top 50 InfoSec Conferences

According to Digital Guardian (formerly Verdasys), there are many individuals, institutions, and events that have changed the face of our industry in recent years. Check out their list of Security Change Agents. Join one of the 50 Best by attending the 2015 HackMiami Conference in Miami Beach on May 15-17, 2015. Register for HackMiami>>

01-17-2015 First meeting of the year!

We will have our first meeting of the year 2015 on Saturday, January 17th. The purpose of this meeting is to gather ideas and projects for the upcoming year. Do you have a presentation you would like to give at Hackmiami?. Do you have any maker projects you would like to spearhead? Do you have a […]

Hackmiami Hackers Conference 2014 CFP

Hackmiami Conference 2014 CFP Hello again and thanks for considering submitting your talks, contest,training, workshops or ideas to us.   Here is basically what we are looking for:       — Talks involving OFFENSIVE research (Make sure you can backup your research as we have been sent non original stuff, trust us we will […]

Hacking U.S. Secrets, China Pushes for Drones

For almost two years, hackers based in Shanghai went after one foreign defense contractor after another, at least 20 in all. Their target, according to an American cybersecurity company that monitored the attacks, was the technology behind the United States’ clear lead in military drones. “I believe this is the largest campaign we’ve seen that […]