BlueHat is back in Redmond, as BlueHat v6: The Vuln Behind The Curtain opens September 27th and 28th. Once again we have two days of great security content that covers the spectrum of issues in security. The BlueHat speakers, both leading external security researchers and internal Microsoft engineers, will pierce the security veil of virtualization and process isolation. Plus, we’ve got a couple of talks on Windows Mobile and more about automated exploit creation – this time using Metasploit. There will also be a talk on a DNS pinning design issue that demonstrates how Internet Explorer can turn into a VPN concentrator. All this--and talks on Office, Binary Instrumentation, Visualization and the Economics of Security! And we’re pretty sure there won’t be any visa issues for our invited speakers. 🙂
As we reflect back on the 10 years of evolution in security at Microsoft, it’s fascinating to watch the deepening of relationships between Microsoft and the security ecosystem, and consider how these relationships tie into larger, longer term initiatives. Hearing from the people doing cutting edge research helps Microsofties understand the external research community’s focus and motivations, and helps us build better products and offerings.