Black Hat USA
August 4-9, 2018
Las Vegas, NV, USA
Black Hat Trainings
October 22-23, 2018
Chicago, IL USA
Black Hat Europe
December 3-6, 2018
London UK
Event Updates
Transparent Orchestration of Security to Accelerate the Digital Transformation Journey
Black Hat Staff,
The extension of infrastructures from on-premises IT environments to multiple cloud ecosystems delivers organizations newly transformed digital services with increased value.
By Sumedh Thakar, Chief Product Officer, Qualys , 6/27/2018
Comment0 comments  |  Read  |  Post a Comment
Black Hat USA 2018:
Comandeering Voice Enabled Devices
Black Hat Staff,
Researchers Amichai Shulman, Ron Marcovich, Tal Be'ery and Yuval Ron will detail a vulnerability of Microsofts Cortana in their Black Hat USA Briefing Open Sesame: Picking Locks with Cortana.
By Black Hat Staff , 6/18/2018
Comment0 comments  |  Read  |  Post a Comment
Announcing: Black Hat Europe 2018
Black Hat Staff,
Black Hat Europe returns to the ExCeL London, December 3-6, 2018
By Black Hat Staff , 6/13/2018
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
How Secure are our Voting Systems for November 2018?
Dark Reading Staff, CommentaryVideo
Anomali CEO Hugh Njemanze discusses the importance of sharing threat intelligence across the countrys highly decentralized voting systems to safeguard the integrity of upcoming elections.
By Dark Reading Staff , 9/14/2018
Comment0 comments  |  Read  |  Post a Comment
4 Practical Measures to Improve Election Security Now
Chris Wysopal,  Chief Technology Officer, CA Veracode Commentary
It's more critical than ever for states to protect our democratic system and voting infrastructure from foreign cyber espionage.
By Chris Wysopal Chief Technology Officer, CA Veracode , 9/11/2018
Comment1 Comment  |  Read  |  Post a Comment
Lessons From the Black Hat USA NOC
Curtis Franklin Jr., Senior Editor at Dark ReadingCommentary
The conference's temporary network operations center provides a snapshot of what is possible when a variety of professionals work together.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/30/2018
Comment0 comments  |  Read  |  Post a Comment
Overestimating WebAssembly's Security Benefits Is Risky for Developers
Dark Reading Staff, CommentaryVideo
Although WebAssembly technology promises both better performance and better security to developers, it also creates a new risk for native exploits in the browser.
By Dark Reading Staff , 8/29/2018
Comment0 comments  |  Read  |  Post a Comment
Researcher Cracks San Francisco's Emergency Siren System
Dark Reading Staff, CommentaryVideo
Bastille researcher Balint Seeber discusses the process of creating SirenJack and cracking one of a city's critical safety systems.
By Dark Reading Staff , 8/24/2018
Comment1 Comment  |  Read  |  Post a Comment
What a Forensic Analysis of 'Worst Voting Machine Ever' Turned Up
Dark Reading Staff, CommentaryVideo
University of Copenhagen associate professor discusses what he found when he dug into some decommissioned WinVote voting machines.
By Dark Reading Staff , 8/22/2018
Comment0 comments  |  Read  |  Post a Comment
The Uncertain Fate of WHOIS, & Other Matters of Internet Accountability
Dark Reading Staff, CommentaryVideo
Paul Vixie discusses the uncertain fate of WHOIS in the age of GDPR, the risks of domain name homographs, and other underpinnings of the Internet that are hard to trust and harder to fix.
By Dark Reading Staff , 8/20/2018
Comment1 Comment  |  Read  |  Post a Comment
How Better Intel Can Reduce, Prevent Payment Card Fraud
Dark Reading Staff, CommentaryVideo
Royal Bank of Canada machine learning researcher and Terbium Labs chief scientist discuss how they use intelligence about the carding market to predict the next payment card fraud victims.
By Dark Reading Staff , 8/20/2018
Comment0 comments  |  Read  |  Post a Comment
Malicious Cryptomining & Other Shifting Threats
Dark Reading Staff, CommentaryVideo
Skybox Security CMO Michelle Johnson Cobb discloses research results that include a spike in malicious cryptomining during Bitcoins peak, a shift to outside-the-perimeter mobile threats, and more.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
The Economics of AI-Enabled Security
Dark Reading Staff, CommentaryVideo
While AI greatly enhances security, Securonix CTO Tanuj Gulati points out the need for predictable cost models that insulate SOCs from the variables of massive data volume and intense real-time processing.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
Using Threat Deception on Malicious Insiders
Dark Reading Staff, CommentaryVideo
Illusive Networks CEO Ofer Israeli reveals how distributed deception technology can be as effective against insider threats as it is against outsiders, since it thwarts the lateral movement common to both.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
Filtering the Threat Intelligence Tsunami
Dark Reading Staff, CommentaryVideo
Reversing Labs CEO Mario Vuksan contends that SOCs are overwhelmed by global threat intelligence, and can benefit more from a targeted "pull" model that focuses on YARA-type binary pattern matching.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
Ensuring Web Applications Are Hardened, Secure
Dark Reading Staff, CommentaryVideo
Ofer Maor of Synopsys Software Integrity Group describes how automated testing can non-intrusively pinpoint where developers may be inadvertently exposing data and/or violating compliance mandates.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
Supplementing the SOC with Cyber-as-a-Service
Dark Reading Staff, CommentaryVideo
Raytheon Cyber Protection Solutions CTO Mark Orlando suggests under-resourced SOCs enhance their effectiveness at-scale by tapping the advanced cyber defense automation his company has developed.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
Assessing & Mitigating Increased Exposure to Third-Party Risk
Dark Reading Staff, CommentaryVideo
As we increasingly connect with each other digitally, CyberGRX CRO Scott Schneider believes we need to be much more diligent about sharing validated insight into the infosec maturity of our organizations.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
Leveraging the Power of your End-Users Human Cognition
Dark Reading Staff, CommentaryVideo
Cofense CEO Rohyt Belani makes a case for more aggressively leveraging the unique ability of your most perceptive and well-trained end-users to help you more quickly spot and stop email threats.
By Dark Reading Staff , 8/17/2018
Comment1 Comment  |  Read  |  Post a Comment
How Orchestration, Automation Help SOCs Do More With Less
Dark Reading Staff, CommentaryVideo
Splunks Haiyan Song and Oliver Friedrichs - co-founder of recently acquired Phantom - explain how security orchestration, automation, and response (SOAR) can empower SOCs to do more with less.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
Simplifying Defense Across the MITRE ATT&CK Matrix
Dark Reading Staff, CommentaryVideo
Endgames Mark Dufresne says SOCs can achieve better results within their existing staff and budget constraints with AI- and visualization-empowered, unified defense across the MITRE ATT&CK matrix.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
The Rise of Bespoke Ransomware
Dark Reading Staff, CommentaryVideo
Drawing from a recent study by SophosLabs, Principal Research Scientist Chester Wisniewski highlights a shift to the rise of more targeted and sophisticated ransomware threats, such as SamSam.
By Dark Reading Staff , 8/17/2018
Comment0 comments  |  Read  |  Post a Comment
Miller & Valasek: Security Stakes Higher for Autonomous Vehicles
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Car hacking specialists shift gears and work on car defense in their latest gigs - at GM subsidiary Cruise Automation.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/15/2018
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 19 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global Briefings and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Video
Register for Dark Reading Newsletters
Current Issue
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: White Privelege Day