Black Hat USA
August 4-9, 2018
Las Vegas, NV, USA
Black Hat Trainings
October 22-23, 2018
Chicago, IL USA
Black Hat Europe
December 3-6, 2018
London UK
Event Updates
What Keeps the CISO Awake at Night
Black Hat Staff,
How to keep your CISO sleeping soundly
By Matthias Maier, Security Evangelist, Splunk , 10/22/2018
Comment0 comments  |  Read  |  Post a Comment
The Patching Paradox: A Path to Intelligent Vulnerability Management
Black Hat Staff,
Imagine: Youre out at sea, sailing through treacherous and uncharted waters. The tips of sharp rocks jutting from the waves give some forewarning of danger, but beneath the surface, twisting reefs and shallow sandbanks threaten to run you aground.
By Chris Pace, Technology Advocate, EMEA, Recorded Future , 10/22/2018
Comment0 comments  |  Read  |  Post a Comment
Deep Dives: New Security Flaws in Apple and Microsoft products at Black Hat Europe
Black Hat Staff,
With Black Hat Europe coming to London in a few months, organizers share three of the most promising Briefings slated for the December event.
By Black Hat Staff , 10/11/2018
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
New Security Woes for Popular IoT Protocols
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researchers at Black Hat Europe will detail denial-of-service and other flaws in MQTT, CoAP machine-to-machine communications protocols that imperil industrial and other IoT networks online.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/18/2018
Comment0 comments  |  Read  |  Post a Comment
IBM Builds 'SOC on Wheels' to Drive Cybersecurity Training
Kelly Sheridan, Staff Editor, Dark ReadingNews
A tractor trailer housing a Cyber Tactical Operation Center will travel throughout the US and Europe for incident response training, security support, and education.
By Kelly Sheridan Staff Editor, Dark Reading, 10/15/2018
Comment1 Comment  |  Read  |  Post a Comment
How Secure are our Voting Systems for November 2018?
Dark Reading Staff, CommentaryVideo
Anomali CEO Hugh Njemanze discusses the importance of sharing threat intelligence across the countrys highly decentralized voting systems to safeguard the integrity of upcoming elections.
By Dark Reading Staff , 9/14/2018
Comment1 Comment  |  Read  |  Post a Comment
4 Practical Measures to Improve Election Security Now
Chris Wysopal,  Chief Technology Officer, CA Veracode Commentary
It's more critical than ever for states to protect our democratic system and voting infrastructure from foreign cyber espionage.
By Chris Wysopal Chief Technology Officer, CA Veracode , 9/11/2018
Comment1 Comment  |  Read  |  Post a Comment
Lessons From the Black Hat USA NOC
Curtis Franklin Jr., Senior Editor at Dark ReadingCommentary
The conference's temporary network operations center provides a snapshot of what is possible when a variety of professionals work together.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/30/2018
Comment0 comments  |  Read  |  Post a Comment
Overestimating WebAssembly's Security Benefits Is Risky for Developers
Dark Reading Staff, CommentaryVideo
Although WebAssembly technology promises both better performance and better security to developers, it also creates a new risk for native exploits in the browser.
By Dark Reading Staff , 8/29/2018
Comment0 comments  |  Read  |  Post a Comment
Researcher Cracks San Francisco's Emergency Siren System
Dark Reading Staff, CommentaryVideo
Bastille researcher Balint Seeber discusses the process of creating SirenJack and cracking one of a city's critical safety systems.
By Dark Reading Staff , 8/24/2018
Comment1 Comment  |  Read  |  Post a Comment
What a Forensic Analysis of 'Worst Voting Machine Ever' Turned Up
Dark Reading Staff, CommentaryVideo
University of Copenhagen associate professor discusses what he found when he dug into some decommissioned WinVote voting machines.
By Dark Reading Staff , 8/22/2018
Comment0 comments  |  Read  |  Post a Comment
The Uncertain Fate of WHOIS, & Other Matters of Internet Accountability
Dark Reading Staff, CommentaryVideo
Paul Vixie discusses the uncertain fate of WHOIS in the age of GDPR, the risks of domain name homographs, and other underpinnings of the Internet that are hard to trust and harder to fix.
By Dark Reading Staff , 8/20/2018
Comment1 Comment  |  Read  |  Post a Comment
How Better Intel Can Reduce, Prevent Payment Card Fraud
Dark Reading Staff, CommentaryVideo
Royal Bank of Canada machine learning researcher and Terbium Labs chief scientist discuss how they use intelligence about the carding market to predict the next payment card fraud victims.
By Dark Reading Staff , 8/20/2018
Comment0 comments  |  Read  |  Post a Comment
Malicious Cryptomining & Other Shifting Threats
Dark Reading Staff, CommentaryVideo
Skybox Security CMO Michelle Johnson Cobb discloses research results that include a spike in malicious cryptomining during Bitcoins peak, a shift to outside-the-perimeter mobile threats, and more.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
The Economics of AI-Enabled Security
Dark Reading Staff, CommentaryVideo
While AI greatly enhances security, Securonix CTO Tanuj Gulati points out the need for predictable cost models that insulate SOCs from the variables of massive data volume and intense real-time processing.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
Using Threat Deception on Malicious Insiders
Dark Reading Staff, CommentaryVideo
Illusive Networks CEO Ofer Israeli reveals how distributed deception technology can be as effective against insider threats as it is against outsiders, since it thwarts the lateral movement common to both.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
Filtering the Threat Intelligence Tsunami
Dark Reading Staff, CommentaryVideo
Reversing Labs CEO Mario Vuksan contends that SOCs are overwhelmed by global threat intelligence, and can benefit more from a targeted "pull" model that focuses on YARA-type binary pattern matching.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
Ensuring Web Applications Are Hardened, Secure
Dark Reading Staff, CommentaryVideo
Ofer Maor of Synopsys Software Integrity Group describes how automated testing can non-intrusively pinpoint where developers may be inadvertently exposing data and/or violating compliance mandates.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
Supplementing the SOC with Cyber-as-a-Service
Dark Reading Staff, CommentaryVideo
Raytheon Cyber Protection Solutions CTO Mark Orlando suggests under-resourced SOCs enhance their effectiveness at-scale by tapping the advanced cyber defense automation his company has developed.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
Assessing & Mitigating Increased Exposure to Third-Party Risk
Dark Reading Staff, CommentaryVideo
As we increasingly connect with each other digitally, CyberGRX CRO Scott Schneider believes we need to be much more diligent about sharing validated insight into the infosec maturity of our organizations.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
Leveraging the Power of your End-Users Human Cognition
Dark Reading Staff, CommentaryVideo
Cofense CEO Rohyt Belani makes a case for more aggressively leveraging the unique ability of your most perceptive and well-trained end-users to help you more quickly spot and stop email threats.
By Dark Reading Staff , 8/17/2018
Comment1 Comment  |  Read  |  Post a Comment
How Orchestration, Automation Help SOCs Do More With Less
Dark Reading Staff, CommentaryVideo
Splunks Haiyan Song and Oliver Friedrichs - co-founder of recently acquired Phantom - explain how security orchestration, automation, and response (SOAR) can empower SOCs to do more with less.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
Simplifying Defense Across the MITRE ATT&CK Matrix
Dark Reading Staff, CommentaryVideo
Endgames Mark Dufresne says SOCs can achieve better results within their existing staff and budget constraints with AI- and visualization-empowered, unified defense across the MITRE ATT&CK matrix.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
Posted by SaulMorris
Current Conversations i agree
In reply to: Re: Jamie Tomasello
Post Your Own Reply
Posted by mariamartin
Current Conversations yeah it's great
In reply to: Re: Great
Post Your Own Reply
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 19 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global Briefings and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Video
Register for Dark Reading Newsletters
Current Issue
Cartoon