Black Hat Asia
March 28-31, 2017
Singapore
Black Hat USA
July 22-27, 2017
Las Vegas, NV, USA
Black Hat Europe
December 4-7, 2017
London UK
Event Updates
Black Hat Review Board Spotlight:
Beyond the Bio with Jamie Butler
Black Hat Staff,
Get to know the Black Hat Review Board in a new interview series, Beyond the Bio. In this series, Black Hat Review Board Members offer insight from their favorite exploits and pastimes to their most memorable Black Hat experiences.
By Black Hat Staff , 3/14/2017
Comment0 comments  |  Read  |  Post a Comment
Black Hat Asia 2017:
CISOs Must Get Proactive about the Internet of Things
Black Hat Staff,
These four steps will help reduce the risk from looming IoT attacks
By Douglas Browne, Managing Director, APAC at Qualys , 3/13/2017
Comment3 comments  |  Read  |  Post a Comment
Black Hat Asia 2017:
Pentesting for Vulnerabilities
Black Hat Staff,
Continually testing for vulnerabilities is critical to threat detection and prevention
By Black Hat Staff , 3/9/2017
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
US Border Policy Shifts May Drive Changes in Laptop Security
Ericka Chickowski, Contributing Writer, Dark ReadingNews
In-cabin laptop ban and requirements to unlock devices for border patrol could have enterprises revisiting their on-device data policies.
By Ericka Chickowski Contributing Writer, Dark Reading, 3/31/2017
Comment10 comments  |  Read  |  Post a Comment
Internet's Security Woes are Not All Technical
Kelly Sheridan, Associate Editor, Dark ReadingNews
Google engineer Halvar Flake told Black Hat Asia attendees that flaws in organizational structure and market power put enterprises at risk.
By Kelly Sheridan Associate Editor, Dark Reading, 3/30/2017
Comment4 comments  |  Read  |  Post a Comment
New Bug Bounty Program Targets IoT Security
Kelly Sheridan, Associate Editor, Dark ReadingNews
GeekPwn bug bounty program aims to collect Internet of Things security vulnerabilities, and highlight mistakes to vendors.
By Kelly Sheridan Associate Editor, Dark Reading, 2/13/2017
Comment0 comments  |  Read  |  Post a Comment
4G Cellular Networks At Risk Of DoS Attacks
Kelly Sheridan, Associate Editor, Dark ReadingNews
Black Hat Europe researcher shows how hackers can conduct denial-of-service attacks on 4G cellular devices around the world.
By Kelly Sheridan Associate Editor, Dark Reading, 11/7/2016
Comment0 comments  |  Read  |  Post a Comment
Threat Hunting: Going After The Big Game
Dark Reading Staff, CommentaryVideo
The Black Hat News Desk welcomes Jian Zhen from Endgame.
By Dark Reading Staff , 11/3/2016
Comment4 comments  |  Read  |  Post a Comment
Catching Online Scammers, Dealers & Drug Dealers With DNS
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researchers at Black Hat Europe this week will demonstrate a streamlined technique for spotting and identifying illicit narcotics, counterfeiters, and other scammer websites and operations.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/2/2016
Comment1 Comment  |  Read  |  Post a Comment
Preparing For Government Data Requests After Apple Vs. FBI
Dark Reading Staff, CommentaryVideo
Jennifer Granick and Riana Pfefferkorn discuss lessons learned from the Apple-FBI case, and how security pros should be prepared if government data requests hit closer to home.
By Dark Reading Staff , 10/31/2016
Comment0 comments  |  Read  |  Post a Comment
Partners In The Battle Against Cyberthreats
Dark Reading Staff, CommentaryVideo
George Karidis of CompuCom and Rodel Alejo from Intel stop by the Dark Reading News Desk.
By Dark Reading Staff , 10/6/2016
Comment0 comments  |  Read  |  Post a Comment
10 Hottest Sessions At Black Hat Europe 2016
Sean Martin, CISSP | President, imsmartin
A sneak-peek at some of the more intriguing Briefings at the upcoming conference in London.
By Sean Martin CISSP | President, imsmartin, 9/30/2016
Comment2 comments  |  Read  |  Post a Comment
Decrypting The Dark Web: Patterns Inside Hacker Forum Activity
Kelly Sheridan, Associate Editor, Dark ReadingNews
Data analysis to be presented at Black Hat Europe highlights trends in communication between bad actors who gather in underground forums across the Dark Web.
By Kelly Sheridan Associate Editor, Dark Reading, 9/29/2016
Comment1 Comment  |  Read  |  Post a Comment
Improving Security Savvy Of Execs And Board Room
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Jeff Welgan describes how best to improve cybersecurity literacy throughout the C-suite.
By Sara Peters Senior Editor at Dark Reading, 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
D-FENSE! Using Research To Craft Effective Cyber Defenses
Dark Reading Staff, CommentaryVideo
A pair of experts from Imperva stops by the Dark Reading News Desk to chat.
By Dark Reading Staff , 9/23/2016
Comment3 comments  |  Read  |  Post a Comment
How Windows 10 Stops Script-Based Attacks On The Fly
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Move over Apple 'Walled Garden.' Windows 10's new antimalware scan interface halts scripts by signing code on the fly... but does it work? Security researcher Nikhil Mittal takes a look.
By Sara Peters Senior Editor at Dark Reading, 9/21/2016
Comment0 comments  |  Read  |  Post a Comment
How You Can Support InfoSec Diversity, Starting With The Colleagues You Already Have
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Jamesha Fisher, Security Operations Engineer of GitHub, visits the Dark Reading News Desk at Black Hat to discuss her work making security more accessible to the uninitiated, and how a predominately white and male information security field can better support women and people of color.
By Sara Peters Senior Editor at Dark Reading, 9/20/2016
Comment3 comments  |  Read  |  Post a Comment
Rise Of Machine Learning: Advancing Security With ML
Dark Reading Staff, CommentaryVideo
Hal Lonas of Webroot drops by the Dark Reading News Desk at Black Hat.
By Dark Reading Staff , 9/20/2016
Comment0 comments  |  Read  |  Post a Comment
The Future Of AI-Based Cybersecurity: It's Here Now
Dark Reading Staff, CommentaryVideo
Stuart McClure, president and CEO of Cylance, stops by the Dark Reading News Desk at Black Hat.
By Dark Reading Staff , 9/19/2016
Comment0 comments  |  Read  |  Post a Comment
Stop Blaming Users. Make Security User-Friendly.
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Jelle Niemantsverdriet of Deloitte explains how security improves if security tools and error messages educate users and 'put a smile on someone's face.'
By Sara Peters Senior Editor at Dark Reading, 9/15/2016
Comment1 Comment  |  Read  |  Post a Comment
Making The Dark Web Less Scary
Dark Reading Staff, CommentaryVideo
Lance James, chief scientist at Flashpoint, stops by the Dark Reading News Desk to share his thoughts about the Dark Web.
By Dark Reading Staff , 9/14/2016
Comment0 comments  |  Read  |  Post a Comment
Keep It Simple: Security For A Complex Enterprise
Dark Reading Staff, CommentaryVideo
Michelle Cobb of Skybox Security talks to Dark Reading about security management.
By Dark Reading Staff , 9/14/2016
Comment0 comments  |  Read  |  Post a Comment
Taking Down Impersonators: Methods For Combating Email Fraud
Dark Reading Staff, CommentaryVideo
Bob Adams, cybersecurity strategist at Mimecast, stops by the Black Hat News Desk.
By Dark Reading Staff , 9/14/2016
Comment0 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 19 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global Briefings and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Video
Register for Dark Reading Newsletters
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.