Black Hat Asia
March 28-31, 2017
Singapore
Black Hat USA
July 22-27, 2017
Las Vegas, NV, USA
Black Hat Europe
December 4-7, 2017
London UK
Event Updates
Black Hat Europe 2017:
New Briefings Announced
Black Hat Staff,
Final Batch of Black Hat Europe 2017 Briefings Released
By Black Hat Staff , 10/18/2017
Comment0 comments  |  Read  |  Post a Comment
Black Hat Europe 2017:
New Briefings Announced
Black Hat Staff,
We are pleased to announce More Briefings selected for presentation at Black Hat Europe 2017!
By Black Hat Staff , 9/27/2017
Comment0 comments  |  Read  |  Post a Comment
Black Hat Europe 2017:
First Briefings Announced
Black Hat Staff,
We are pleased to announce the first Briefings selected for presentation at Black Hat Europe 2017!
By Black Hat Staff , 9/20/2017
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
How Security Metrics Fail Us & How We Fail Them
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Joseph Carson of Thycotic discusses how infosec professionals buy security products they don't need and make other bad decisions, because of poor use of metrics.
By Sara Peters Senior Editor at Dark Reading, 9/26/2017
Comment1 Comment  |  Read  |  Post a Comment
Attacking Developers Using 'Shadow Containers'
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Sagie Dulce describes why developers are such attractive targets and how the Docker API can be exploited to use one of developers' favorite tools against them in sneaky, obfuscated attacks.
By Sara Peters Senior Editor at Dark Reading, 9/15/2017
Comment0 comments  |  Read  |  Post a Comment
A New Model for 'Mathematically Provable Security'
Tim Wilson, Editor in Chief, Dark Reading, CommentaryVideo
Winn Schwartau, CEO of The Security Awareness Company, says we all know the old model of security is broken and it's time for a new one.
By Tim Wilson, Editor in Chief, Dark Reading , 9/14/2017
Comment1 Comment  |  Read  |  Post a Comment
Deception: A Convincing New Approach to Cyber Defense
Ofer Israeli, CEO & Founder, illusive networksCommentary
How defenders in a US national security agency capture-the-flag exercise used an endless stream of false data across the network to thwart attackers and contain damage.
By Ofer Israeli CEO & Founder, illusive networks, 9/12/2017
Comment0 comments  |  Read  |  Post a Comment
Tesla Hacks: The Good, The Bad, & The Ugly
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Keen Security Lab found multiple holes in the isolation layer Tesla uses to protect drive systems from infotainment systems, but were impressed by the auto company's security in other ways.
By Sara Peters Senior Editor at Dark Reading, 9/12/2017
Comment1 Comment  |  Read  |  Post a Comment
Paul Vixie: How CISOs Can Use DNS to Up Security
Tim Wilson, Editor in Chief, Dark Reading, CommentaryVideo
FarSight CEO and DNS master Paul Vixie explains how enterprises, not just telecoms and infrastructure providers, can use DNS to improve cybersecurity.
By Tim Wilson, Editor in Chief, Dark Reading , 9/11/2017
Comment0 comments  |  Read  |  Post a Comment
Attacking Data Integrity & Hacking Radiation Monitoring Devices
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Ruben Santamarta shows radio-based vulnerabilities and investigates how the integrity of critical data can be manipulated to simulate, complicate or exacerbate emergency situations.
By Sara Peters Senior Editor at Dark Reading, 9/8/2017
Comment0 comments  |  Read  |  Post a Comment
How Legendary Carder, Hacker Roman Seleznev Was Caught, Sentenced
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Assistant US Attorney Norman Barbosa visits the Dark Reading News Desk to discuss details of the credit card hacking case that led to an unprecedented 27-year prison sentence.
By Sara Peters Senior Editor at Dark Reading, 9/6/2017
Comment0 comments  |  Read  |  Post a Comment
Activists Beware: The Latest In 3G & 4G Spying
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Ravi Borgaonkar describes new 3G & 4G vulnerabilities that enable IMSI catchers to be smarter, stealthier snoopers.
By Sara Peters Senior Editor at Dark Reading, 9/5/2017
Comment0 comments  |  Read  |  Post a Comment
To Improve Diversity, 'Have the Uncomfortable Conversations'
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Jules Okafor of Fortress Information Security explains that diversity efforts cannot shy away from discussions of racism and sexism.
By Sara Peters Senior Editor at Dark Reading, 9/5/2017
Comment0 comments  |  Read  |  Post a Comment
Mikko Hypponen's Vision of the Cybersecurity Future
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Twenty years from now, will everything be in the Internet of Things, and if so, how does the security industry need to prepare? F-Secure's chief research officer weighs in on this and what else the future promises (and threatens).
By Sara Peters Senior Editor at Dark Reading, 9/4/2017
Comment2 comments  |  Read  |  Post a Comment
Using Market Pressures to Improve Cybersecurity
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Post-MedSec, Chris Wysopal discusses what impact the investor community -- if not consumers -- can have on squashing vulnerabilities and improving cybersecurity.
By Sara Peters Senior Editor at Dark Reading, 8/31/2017
Comment0 comments  |  Read  |  Post a Comment
The Active Directory Botnet
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
It's a nightmare of an implementation error with no easy fix. Ty Miller and Paul Kalinin explain how and why an attacker could build an entire botnet inside your organization.
By Sara Peters Senior Editor at Dark Reading, 8/30/2017
Comment0 comments  |  Read  |  Post a Comment
Training Courses for Aspiring Cybercriminals Put Security Education To Shame
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Reasonably priced, module-based training courses and helpful forums will train a beginner in all the tools and techniques of the successful cybercriminal, Rick Holland of Digital Shadows explains.
By Sara Peters Senior Editor at Dark Reading, 8/29/2017
Comment1 Comment  |  Read  |  Post a Comment
IoTCandyJar: A HoneyPot for any IoT Device
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Palo Alto Networks researchers explain how they designed an affordable, behavior-based honeypot to detect attacks on an IoT device -- any kind of IoT device.
By Sara Peters Senior Editor at Dark Reading, 8/29/2017
Comment0 comments  |  Read  |  Post a Comment
Insecure IoT Devices Pose Physical Threat to General Public
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
At the car wash, look out for attack robots. Billy Rios discusses how IoT devices could be hacked to physically attack people -- not just on factory floors, but in everyday public settings.
By Sara Peters Senior Editor at Dark Reading, 8/24/2017
Comment0 comments  |  Read  |  Post a Comment
Dino Dai Zovi Dives Into Container Security, SecDevOps
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Dino Dai Zovi discusses the under-explored security aspects of Docker, data center orchestration, and containers.
By Sara Peters Senior Editor at Dark Reading, 8/23/2017
Comment0 comments  |  Read  |  Post a Comment
Why Most Security Awareness Training Fails (And What To Do About It)
Tim Wilson, Editor in Chief, Dark Reading, CommentaryVideo
Arun Vishwanath discusses why awareness training shouldn't apply the same cure to every ailment then blame the patient when the treatment doesn't work.
By Tim Wilson, Editor in Chief, Dark Reading , 8/22/2017
Comment2 comments  |  Read  |  Post a Comment
The Benefits of Exploiting Attackers' Favorite Tools
Tim Wilson, Editor in Chief, Dark Reading, CommentaryVideo
Symantec senior threat researcher Waylon Grange explains that attackers write vulnerable code, too.
By Tim Wilson, Editor in Chief, Dark Reading , 8/22/2017
Comment0 comments  |  Read  |  Post a Comment
How To Avoid Legal Trouble When Protecting Client Data
Dark Reading Staff, CommentaryVideo
Attorneys discuss how cybersecurity consultants can manage conflicts between e-discovery demands and client agreements.
By Dark Reading Staff , 8/21/2017
Comment0 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
Posted by nisabila50
Current Conversations interesting and useful. thanks
In reply to: rara
Post Your Own Reply
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 19 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global Briefings and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Video
Register for Dark Reading Newsletters
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Cartoon Contest