Troy is a Microsoft Regional Director and MVP, Pluralsight author and world-renowned internet security specialist. He spends his time teaching developers how to break into their own systems before helping to piece them back together to be secure against today’s online threats. He’s also the creator of “Have I been pwned?”, the free online service for breach monitoring and notifications. Troy regularly blogs at troyhunt.com from his home in Australia.
Talks I've Given
-
Rise of the Breaches
Featuring Troy Hunt
Data breaches are the new normal. We’ve created ecosystems with so many moving parts and so
security
many complex units, it’s little wonder that we so frequently see them go wrong. A combination of
more systems, more people, more devices and more ways than ever of producing and publishing
data stack the... -
Rise of the Breaches
Featuring Troy Hunt
Data breaches are the new normal. We’ve created ecosystems with so many moving parts and so
security
many complex units, it’s little wonder that we so frequently see them go wrong. A combination of
more systems, more people, more devices and more ways than ever of producing and publishing
data stack the... -
Rise of the Breaches
Featuring Troy Hunt
Data breaches are the new normal. We’ve created ecosystems with so many moving parts and so
security
many complex units, it’s little wonder that we so frequently see them go wrong. A combination of
more systems, more people, more devices and more ways than ever of producing and publishing
data stack the... -
Clouds, Codes and Cybers with Troy Hunt
Featuring Troy Hunt
Ah, the cloud! There’s no faster way to back your data up so that anybody can make a globally distributed redundant copy of it. Not intentionally, mind you, but that’s what we’re doing every single day; unintentionally spreading valuable customer data around the web where it is then hacked, sold,...
.net code azure cyber cloud -
Making Hacking Child’s Play
Featuring Troy Hunt
How does it keep happening? I mean why are websites so consistently hacked? Is it the work of sophisticated cyber-villains operating from underground lairs? As it turns out, many of today’s online attacks are mounted by kids – legally children – who simply have time, patience...
people-&-process -
Making Hacking Child’s Play
Featuring Troy Hunt
How does it keep happening? I mean why are websites so consistently hacked? Is it the work of sophisticated cyber-villains operating from underground lairs? As it turns out, many of today’s online attacks are mounted by kids – legally children – who simply have time, patience...
people-&-process -
Making Hacking Child’s Play
Featuring Troy Hunt
How does it keep happening? I mean why are websites so consistently hacked? Is it the work of sophisticated cyber-villains operating from underground lairs? As it turns out, many of today’s online attacks are mounted by kids – legally children – who simply have time, patience...
people-&-process -
Hack yourself first: go on the cyber-offence before online attackers do
Featuring Troy Hunt
The prevalence of online attacks against websites has accelerated quickly recently and the same risks continue to be exploited. However, these are often easily identified directly within the browser; it’s just a matter of understanding the vulnerable patterns to look for.
‘Hack...
performance-&-security -
Hack yourself first: go on the cyber-offence before online attackers do
Featuring Troy Hunt
The prevalence of online attacks against websites has accelerated quickly recently and the same risks continue to be exploited. However, these are often easily identified directly within the browser; it’s just a matter of understanding the vulnerable patterns to look for.
‘Hack...
performance-&-security -
Hack yourself first: go on the cyber-offence before online attackers do
Featuring Troy Hunt
The prevalence of online attacks against websites has accelerated quickly recently and the same risks continue to be exploited. However, these are often easily identified directly within the browser; it’s just a matter of understanding the vulnerable patterns to look for.
‘Hack...
performance-&-security