Jose L. Quiñones-Borrero, profile picture

Jose L. Quiñones-Borrero

Sort by
Hacking blockchain
Application Security: What do we need to know?
Cryto Party at CCU
Weaponization of IoT
Incident response, Hacker Techniques and Countermeasures
"Certified" apps, are they really secure? Break them or fix them, your choice!
Security B Sides Puerto Rico - Weaponizing your Drone
CyberCrime attacks on Small Businesses
Securing Your Business
InfoSec Gamification
Privacy on the Internet - Init6 InfoSec August Meeting
Pivoting Networks - CSSIG Presentation
Hacker risks presentation to ACFE PR Chapter
Linux for Security Professionals (Tips and Tricks) - Init 6 10/2012
Security and Compliance Panel at the PR TechSummit 2013