{"title":"ShmooCon\u306b\u53c2\u52a0\u3057\u3066\u304d\u305f\uff01\uff01","height":"190","url":"https://www.scientia-security.org/entry/2017/01/17/055310","provider_name":"Hatena Blog","description":"2017/01/18 \u4e00\u90e8\u8a18\u4e8b\u3092\u8ffd\u52a0\u3057\u307e\u3057\u305f\u3002 ShmooCon\u3068\u3044\u3046\u30ab\u30f3\u30d5\u30a1\u30ec\u30f3\u30b9\u306b\u3044\u3063\u3066\u304d\u307e\u3057\u305f\uff01\uff01 ShmooCon\u306f\u3082\u3068\u3082\u3068\u3042\u307e\u308a\u65e5\u672c\u3067\u3042\u307e\u308a\u6709\u540d\u306a\u30ab\u30f3\u30d5\u30a1\u30ec\u30f3\u30b9\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3067\u3057\u305f\u304c\u3001\u4ee5\u4e0b\u306e\u8a18\u4e8b\u3092\u898b\u3066\u6bd4\u8f03\u7684\u8a55\u5224\u304c\u3088\u3044\u3068\u77e5\u308a\u53c2\u52a0\u3057\u305f\u7d4c\u7def\u304c\u3042\u308a\u307e\u3059\u3002 www.concise-courses.com \u4eca\u56de\u53d7\u3051\u305f\u4e2d\u3067\u6bd4\u8f03\u7684\u9762\u767d\u304b\u3063\u305fThreat Intelligence\u95a2\u9023\u306e\u8a71\u306b\u3064\u3044\u3066\u3001\u5831\u544a\u3057\u305f\u3044\u3068\u601d\u3044\u307e\u3059\u3002 Leveraging Threat Intel Disinformation Campaigns \u4e00\u3064\u76ee\u306f\u3001Cyber Attribution\u306b\u5bfe\u6297\u3059\u308bCyber Disinforma\u2026","author_url":"https://blog.hatena.ne.jp/security_consultant/","type":"rich","categories":["\u30ab\u30f3\u30d5\u30a1\u30ec\u30f3\u30b9\u30fb\u7814\u4fee"],"provider_url":"https://hatena.blog","version":"1.0","width":"100%","image_url":null,"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fwww.scientia-security.org%2Fentry%2F2017%2F01%2F17%2F055310\" title=\"ShmooCon\u306b\u53c2\u52a0\u3057\u3066\u304d\u305f\uff01\uff01 - \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b3\u30f3\u30b5\u30eb\u30bf\u30f3\u30c8\u306e\u65e5\u8a8c\u304b\u3089\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","blog_url":"https://www.scientia-security.org/","blog_title":"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b3\u30f3\u30b5\u30eb\u30bf\u30f3\u30c8\u306e\u65e5\u8a8c\u304b\u3089","published":"2017-01-17 05:53:10","author_name":"security_consultant"}