
The Contest Has Ended
We no longer accept any submissions.
WIRED Security (20 October 2016) is a new one-day event, which will gather more than 20 industry-leading Main Stage speakers, plus an exciting selection of startups and growth-stage companies working in the fields of software, intelligence and security services.
Check out the event here: http://www.wiredevent.co.uk/wired-security
Speakers: http://www.wiredevent.co.uk/wired-security-speakers
As a partner of WIRED Security Hakin9 has a chance to give two free tickets to this amazing conference. Remember that WIRED SECURITY: BE THERE OR BE HACKED event takes place in London, so make sure that you will be able to participate in it.
To win the ticket you have to write a few sentences on what do you think will be the biggest cyberthreat in 2017, and why. To deliver your answer, please
-
post your answer as a comment below this blog post
-
post your answer on our Facebook Page
-
send your answer to [email protected] with “WIRED SECURITY” in the header.
The tickets will be given to someone chosen by the editorial team from all the people who give an eligible answer (through any media available) before October 12th, 11:59 PM CET. The winner will be announced and contacted on October 13th.
All answers will be read and evaluated, and the best ones will be featured in the next issue of Hakin9 Magazine.
Want to go but don’t want to take part in the competition? Our readers get 25% discount! https://hakin9.org/wired/
Author

- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
Latest Articles
Blog2022.12.13What are the Common Security Weaknesses of Cloud Based Networks?
Blog2022.10.12Vulnerability management with Wazuh open source XDR
Blog2022.08.29Deception Technologies: Improving Incident Detection and Response by Alex Vakulov
Blog2022.08.25Exploring the Heightened Importance of Cybersecurity in Mobile App Development by Jeff Kalwerisky
Ransomware will only continue grow since somewhat it is one of the scariest thing for data and anyone relying on constant uptime of it