Confused Learning: Supply Chain Attacks through Machine Learning Models Share: Download MP3 Similar Tracks Cloud Console Cartographer: Tapping Into Mapping- Slogging Thru Logging Black Hat Reflections on Trust in the Software Supply Chain Black Hat Andrew Ng Explores The Rise Of AI Agents And Agentic Reasoning | BUILD 2024 Keynote Snowflake Inc. LinkDoor: A Hidden Attack Surface in the Android Netlink Kernel Modules Black Hat Unlocking the Power of LLMs: Next generation recommender systems DataFest Yerevan Think Fast, Talk Smart: Communication Techniques Stanford Graduate School of Business Linked-Out: Security Principles to Break Software Supply Chain Attacks RSA Conference A Conversation with Alice Leach, Data Engineer at Whatnot Inc. acreeg111 Cybersecurity Architecture: Who Are You? Identity and Access Management IBM Technology Living off Microsoft Copilot Black Hat PLC Troubleshooting 101. Basic Steps to Diagnose and Fix Your Machine Tim Wilborne Stanford CS229 I Machine Learning I Building Large Language Models (LLMs) Stanford Online Cybersecurity Modeling and Simulation Policy Dynamics Inc. The Dark Side of AI: The Hidden Supply Chain Risks in Open... - Jossef Kadouri & Tzachi Zornshtain The Linux Foundation How to Build LLMs on Your Company’s Data While on a Budget Databricks Minder Monday: Deep Dive - The Minder Ontology Stacklok Marty Lobdell - Study Less Study Smart Pierce College District WA Vendor-Agnostic Cloud-Native Apps DevOpsDays Singapore DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini DEFCONConference Sharding the Future: Redefining dApp Design with ZK Chains | Daniel Lumi @ ETH CC 24 Lumi (@zkLumi)