Black Hat Europe
November 10-13, 2015
Amsterdam RAI | The Netherlands
BH Executive Summit
December 8-10, 2015
Omni Montelucia | Scottsdale, AZ
Black Hat Asia
March 29 - April 1, 2016
Marina Bay Sands | Singapore
Event Updates
Black Hat USA 2015: Breaking Windows
Black Hat Staff,
It wouldn't be a proper Black Hat event without a host of interesting new exploits for Microsoft's widely used operating systems, so here are four Black Hat USA 2015 Briefings that will teach you how to break Windows in fresh new ways.
By Black Hat Staff , 7/30/2015
Comment0 comments  |  Read  |  Post a Comment
Black Hat USA 2015: Let's Get Physical
Black Hat Staff,
It's tempting to think of InfoSec purely in virtual terms, as electrons flowing through circuits and logic gates. But these microscopic events can affect the human-scale physical world, and unexpected physical interventions can also break seemingly secure micro-systems. Today's trio of Black Hat USA 2015 Briefings all demonstrate how this street runs both ways.
By Black Hat Staff , 7/28/2015
Comment0 comments  |  Read  |  Post a Comment
Black Hat USA 2015: Border Patrol
Black Hat Staff,
Border Gateway Protocol (BGP) is the fabric of routing on the Internet today, with a approximately half a million routes between 50,000 autonomous systems. Sounds like a ripe target for malicious parties to exploit, which is the gist of today's trio of Black Hat Briefing highlights.
By Black Hat Staff , 7/23/2015
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
Sights & Sounds Of Black Hat USA And DEF CON
Kelly Jackson Higgins, Executive Editor at Dark Reading
Some hackers call the week of Black Hat USA and DEF CON 'security summer camp' -- a look at some of the highlights of the two shows.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/31/2015
Comment0 comments  |  Read  |  Post a Comment
A CISO's View of Mobile Security Strategy, With Stacey Halota
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
CISO of Graham Holdings visits Dark Reading News Desk at Black Hat to discuss why mobile security is a top priority and how to use mobile devices as a security tool.
By Sara Peters Senior Editor at Dark Reading, 8/31/2015
Comment0 comments  |  Read  |  Post a Comment
The Security Of Applications And CISOs' Sanity, With Veracode's Chris Wysopal
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Veracode's Chris Wysopal visits the Dark Reading News Desk at Black Hat to discuss application security, what CISOs' top priorities are, and what they should be.
By Sara Peters Senior Editor at Dark Reading, 8/27/2015
Comment0 comments  |  Read  |  Post a Comment
A Virtual Tour of IBM’s SOCs, With Roger Hellman
Dark Reading Staff, CommentaryVideo
IBM's Roger Hellman visits the Dark Reading News Desk to talk about how IBM recreated a unique security operations center experience at Black Hat.
By Dark Reading Staff , 8/27/2015
Comment0 comments  |  Read  |  Post a Comment
Catching Attackers In The Act Of Stage Two, With Gigamon
Dark Reading Staff, CommentaryVideo
Shehzad Merchant, CTO of Gigamon, visits the Dark Reading News Desk to discuss a platform for finding and containing attackers once they've broken through your perimeter defense.
By Dark Reading Staff , 8/27/2015
Comment1 Comment  |  Read  |  Post a Comment
Seeing Into Security 'Blind Spots' With Bay Dynamics' Gautam Aggarwal
Dark Reading Staff, CommentaryVideo
Gautam Aggarwal, CMO of Bay Dynamics, visits Dark Reading News Desk at Black Hat to explain that it’s important to not just develop a cybersecurity strategy, but to also better understand what your security blind spots are.
By Dark Reading Staff , 8/27/2015
Comment3 comments  |  Read  |  Post a Comment
Evolution Of The CISO And The Board: BAE Systems’ Jim Anderson Explains
Dark Reading Staff, CommentaryVideo
President of the Americas for BAE Systems Applied Intelligence, Jim Anderson, joins the Dark Reading News Desk at Black Hat to explain how the CISO has to improve communications with the corporate board and better explain overall security strategy.
By Dark Reading Staff , 8/27/2015
Comment0 comments  |  Read  |  Post a Comment
RiskIQ's Arian Evans Talks Up Hunting Down Digital Assets
Dark Reading Staff, CommentaryVideo
You can't protect what you can't find. Arian Evans, vice president of product marketing for RiskIQ, joins the Dark Reading News Desk at Black Hat to explain how to discover all your assets.
By Dark Reading Staff , 8/27/2015
Comment0 comments  |  Read  |  Post a Comment
Kelly's Glimpse Of Black Hat
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Dark Reading executive editor Kelly Jackson Higgins talks through the top trends and sessions, and how the industry has evolved since her first trip to Black Hat.
By Sara Peters Senior Editor at Dark Reading, 8/26/2015
Comment0 comments  |  Read  |  Post a Comment
Paul Vixie On DNS Security & Botnet Takedowns
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Internet pioneer and CEO of Farsight Security joins the Dark Reading News Desk at Black Hat.
By Sara Peters Senior Editor at Dark Reading, 8/24/2015
Comment3 comments  |  Read  |  Post a Comment
Pen Testing A Smart City
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Black Hat speakers visit the Dark Reading News Desk to discuss the stunning complexity and many soft spots of a metropolis full of IoT devices.
By Sara Peters Senior Editor at Dark Reading, 8/21/2015
Comment1 Comment  |  Read  |  Post a Comment
AlienSpy RAT Resurfaces In Case Of Real-Life Political Intrigue
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Mysterious death of Argentinian politician potentially tied to his phone's infection with popular remote access tool.
By Ericka Chickowski Contributing Writer, Dark Reading, 8/21/2015
Comment0 comments  |  Read  |  Post a Comment
Re-evaluating Ransomware, Without The Hype
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Engin Kirda, chief architect of LastLine, joins the Dark Reading News Desk at Black Hat Aug. 5 to explain why most ransomware isn't as scary as we think.
By Sara Peters Senior Editor at Dark Reading, 8/18/2015
Comment2 comments  |  Read  |  Post a Comment
An Apple Fanboi Writing Malware For Mac OSX
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Patrick Wardle, director of research for Synack, spoke about his "Writing Bad@$$ Malware for OS X" session at the Dark Reading News Desk at Black Hat.
By Sara Peters Senior Editor at Dark Reading, 8/18/2015
Comment3 comments  |  Read  |  Post a Comment
Richard Bejtlich Talks Business Security Strategy, US Security Policy
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Chief security strategist of FireEye talks at the Dark Reading News Desk at Black Hat about attribution, the war on encryption, and what should drive your security department.
By Sara Peters Senior Editor at Dark Reading, 8/17/2015
Comment1 Comment  |  Read  |  Post a Comment
Black Hat, Data Science, Machine Learning, and… YOU!
Jeremiah Grossman, Commentary
The time has come for security pros to start honing in on their machine learning skills. Here’s why.
By Jeremiah Grossman , 8/14/2015
Comment1 Comment  |  Read  |  Post a Comment
Securing Black Hat From Black Hat
Aamir Lakhani, Senior Security Strategist & Hacker, Fortinet, FortiGuard Advanced LabsCommentary
‘Dr. Chaos’ shares the inside scoop on the challenges and rewards of protecting one of the 'most hostile networks on the planet.'
By Aamir Lakhani Senior Security Strategist & Hacker, Fortinet, FortiGuard Advanced Labs, 8/14/2015
Comment1 Comment  |  Read  |  Post a Comment
Mad World: The Truth About Bug Bounties
Katie Moussouris, Chief Policy Officer, HackerOneCommentary
What Oracle CSO Mary Ann Davidson doesn’t get about modern security vulnerability disclosure.
By Katie Moussouris Chief Policy Officer, HackerOne, 8/13/2015
Comment5 comments  |  Read  |  Post a Comment
Former White House Advisor, Paul Kurtz, On Info Sharing & Government Action
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Former cybersecurity advisor to the White House talks to Sara Peters at Black Hat about information sharing, attribution, cybersecurity legislation, and his new start-up.
By Sara Peters Senior Editor at Dark Reading, 8/12/2015
Comment0 comments  |  Read  |  Post a Comment
Securing OS X: Apple, Security Vendors Need To Up Their Game
Rutrell Yasin, Business Technology Writer, Tech Writers BureauNews
To date, OS X malware is pretty lame, but it’s easy to write better malware to bypass current defenses, security researcher Patrick Wardle told a Black Hat audience last week.
By Rutrell Yasin Business Technology Writer, Tech Writers Bureau, 8/12/2015
Comment2 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
Posted by harkahibangayi
Current Conversations Great!
In reply to: Awesome
Post Your Own Reply
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 17 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global Briefings and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Video
Register for Dark Reading Newsletters
Current Issue
Cartoon