Black Hat USA
July 30 - August 4, 2016
Mandalay Bay | Las Vegas, NV
Black Hat Europe
November 1-4, 2016
London UK
Black Hat Asia
March 28-31, 2017
Singapore
Event Updates
Black Hat USA 2016: Windows Security
Black Hat Staff,
Microsoft’s Windows dominates the OS landscape, accounting for 89% of the market (according to Hot Hardware), and the latest Windows upgrade, Windows 10, is now running on 300 million active devices worldwide (reported by Microsoft). Being the leader in the space also makes Windows a huge target for hackers who constantly scan for vulnerabilities in the system.
By Black Hat Staff , 6/15/2016
Comment0 comments  |  Read  |  Post a Comment
Black Hat USA 2016: Digital Communication Security
Black Hat Staff,
In a global population of 7.395 billion people, 3.419 billion people are internet users and of those, 2.307 billion people communicate via social media (according to the study “Digital in 2016” by We Are Social). Since a large portion of the world’s population communicates using the internet, cyber security is a priority for users.
By Black Hat Staff , 6/6/2016
Comment0 comments  |  Read  |  Post a Comment
Black Hat USA 2016: Mobile Hacking
Black Hat Staff,
Over 1.4 billion people across the world are using Android devices, according to Google. Unlike Apple’s iOS, Android is not tied to a specific manufacturer, allowing it to account for 81.6% of the smartphone operating system market (Statistica). However, since Android dominates the smartphone market, it presents an ideal opportunity for hackers to tap into a large base of user information. It’s essential for Android users, as well as iOS users, to learn how to protect themselves.
By Black Hat Staff , 5/17/2016
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
The Newbie’s 'How To Survive Black Hat' Guide
Lysa Myers, Security Researcher, ESETCommentary
There’s little chance you won’t be totally exhausted after “drinking from the information firehose” all week. But if you follow these eight steps, it will be a very satisfying kind of fatigue.
By Lysa Myers Security Researcher, ESET, 6/29/2016
Comment0 comments  |  Read  |  Post a Comment
10 Newsmakers Who Shaped Security In the Past Decade
Kelly Jackson Higgins, Executive Editor at Dark Reading
In celebration of Dark Reading’s 10th anniversary, we profile ten people whose actions influenced and shaped the trajectory of the industry – for better or for worse -- in the past ten years.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/28/2016
Comment0 comments  |  Read  |  Post a Comment
15 Cybersecurity Lessons We Should Have Learned From 2015, But Probably Didn't
Sara Peters, Senior Editor at Dark ReadingNews
Another infosec year is almost in the books. What did all the breaches, vulnerabilities, trends, and controversies teach us?
By Sara Peters Senior Editor at Dark Reading, 12/28/2015
Comment7 comments  |  Read  |  Post a Comment
The Youthful Side Of Hacking
Peter Gyongyosi, Product Manager, BalabitCommentary
If the iconic 1955 movie Rebel Without a Cause was remade today, would James Dean be a computer hacker?
By Peter Gyongyosi Product Manager, Balabit, 11/25/2015
Comment11 comments  |  Read  |  Post a Comment
We Need A New Word For Cyber
John B. Dickson, CISSP,  Principal, Denim GroupCommentary
It’s time to find an alternative for 'cyber' (an adjective or noun) before the term – like 'google' -- becomes a verb.
By John B. Dickson CISSP, Principal, Denim Group, 11/23/2015
Comment6 comments  |  Read  |  Post a Comment
Solving Security: If You Want Something New, Stop Doing Something Old
Marilyn Cohodas, Community Editor, Dark ReadingNews
Black Hat Europe keynoter Haroon Meer tells security pros to work smarter, think out of the box, and speak out to the C-suite.
By Marilyn Cohodas Community Editor, Dark Reading, 11/12/2015
Comment0 comments  |  Read  |  Post a Comment
New 4G LTE Hacks Punch Holes In Privacy
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Black Hat Europe researchers to demonstrate newly found flaws in 4G mobile that expose privacy and disrupt phone service.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/9/2015
Comment0 comments  |  Read  |  Post a Comment
Cybersecurity Skills Gap: Too Good To Be True For Job Seekers?
Marilyn Cohodas, Community Editor, Dark ReadingCommentary
New track at Black Hat Europe explores the special challenges of managing an information security career for both job hunters and job hirers.
By Marilyn Cohodas Community Editor, Dark Reading, 11/9/2015
Comment0 comments  |  Read  |  Post a Comment
AndroBugs: A Framework For Android Vulnerability Scanning
Sara Peters, Senior Editor at Dark ReadingNews
At Black Hat Europe next week, a researcher will present a framework he says is more systematic than the vulnerability scanners popping up on the market.
By Sara Peters Senior Editor at Dark Reading, 11/4/2015
Comment0 comments  |  Read  |  Post a Comment
How Hackers Can Hack The Oil & Gas Industry Via ERP Systems
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researchers at Black Hat Europe next month will demonstrate how SAP applications can be used as a stepping-stone to sabotage oil & gas processes.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/28/2015
Comment3 comments  |  Read  |  Post a Comment
The Internet of Things: It’s All About Trust
Kevin Bocek, VP Security Strategy & Threat Intelligence, VenafiCommentary
As billions of devices come online, it will be critical to protect the keys and certificates we use for authentication, validation, and privileged access control.
By Kevin Bocek VP Security Strategy & Threat Intelligence, Venafi, 10/16/2015
Comment1 Comment  |  Read  |  Post a Comment
More Reasons To Drop The War On Encryption
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Rod Beckstrom, founding director of the US National Cybersecurity Center visits the Dark Reading News Desk at Black Hat to discuss cybercrime legislation, takedown operations, and why law enforcement should drop the war on encryption.
By Sara Peters Senior Editor at Dark Reading, 10/9/2015
Comment15 comments  |  Read  |  Post a Comment
Defending & Exploiting SAP Systems
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Juan Pablo Perez-Etchegoyen, CTO of Onapsis, joins the Dark Reading News Desk at Black Hat to discuss the technological and organizational challenges of SAP security.
By Sara Peters Senior Editor at Dark Reading, 10/7/2015
Comment2 comments  |  Read  |  Post a Comment
Segmentation: A Fire Code For Network Security
TK Keanini, CTO, LancopeCommentary
New technologies like software-defined segmentation are making it easier to prevent a compromise from spreading by separating users and network resources into zones.
By TK Keanini CTO, Lancope, 10/5/2015
Comment0 comments  |  Read  |  Post a Comment
A Wassenaar Arrangement Primer, With Katie Moussouris
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
The chief policy officer for HackerOne joins the Dark Reading News Desk at Black Hat to explain how the security community is working to prevent a policy 'dragnet' that would injure American infosec companies and researchers.
By Sara Peters Senior Editor at Dark Reading, 10/5/2015
Comment0 comments  |  Read  |  Post a Comment
What Security Pros Really Worry About
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Editor-in-Chief Tim Wilson visits the Dark Reading News Desk to report what security pros have told us in latest Black Hat and Dark Reading surveys about their priorities and what keeps them from them.
By Sara Peters Senior Editor at Dark Reading, 10/2/2015
Comment0 comments  |  Read  |  Post a Comment
Getting The Most From Your Security Investments
Kelley Damore, CommentaryVideo
In an interview at Black Hat, Shehzad Merchant, CTO of Gigamon, shares his thoughts with the Dark Reading News Desk on how CISOs can get the most out of their technology investments when it comes to fighting breaches.
By Kelley Damore , 9/28/2015
Comment0 comments  |  Read  |  Post a Comment
Keep Your Digital Assets Safe
Brian Gillooly, Vice President, Event Content & Strategy, UBM TechCommentaryVideo
Arian Evans, VP of product strategy at RiskIQ, talks to the Dark Reading News Desk at Black Hat about RiskIQ’s new online digital asset inventory discovery and security platform, Enterprise Digital Footprint.
By Brian Gillooly Vice President, Event Content & Strategy, UBM Tech, 9/28/2015
Comment0 comments  |  Read  |  Post a Comment
What Companies Want In A CISO
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Joyce Brocaglia founder of the Executive Women's Forum and CEO of Alta Associates joins the Dark Reading News Desk at Black Hat to discuss closing the gender gap in security and what companies are looking for in a CISO.
By Sara Peters Senior Editor at Dark Reading, 9/23/2015
Comment0 comments  |  Read  |  Post a Comment
Dan Kaminsky's Visions Of The CISO's Future
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Dan Kaminsky, chief scientist and founder of White Ops, visits Dark Reading News Desk at Black Hat to explain a 'fairly controversial' opinion about how to fix the security skills shortage, and why CISOs' budgets will double, then double again.
By Sara Peters Senior Editor at Dark Reading, 9/16/2015
Comment0 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
Posted by raijakson
Current Conversations good post
In reply to: Re: Flash
Post Your Own Reply
Posted by saiopen
Current Conversations nice post
In reply to: Re: interesting video
Post Your Own Reply
Posted by Manyanti
Current Conversations i appreciate your comments
In reply to: Re: Flash
Post Your Own Reply
Posted by Jamesbrownpal
Current Conversations good information nice
In reply to: Re: Pending Review
Post Your Own Reply
Posted by Griezmannpal
Current Conversations GREAT INFORMATION
In reply to: Re: Pending Review
Post Your Own Reply
Posted by Benwatanabe
Current Conversations nice post great one
In reply to: Re: Pending Review
Post Your Own Reply
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 17 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global Briefings and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Video
Register for Dark Reading Newsletters
Current Issue
DNS Threats: What Every Enterprise Should Know
Domain Name System exploits could put your data at risk. Here's some advice on how to avoid them.
Cartoon