Get to know the Black Hat Review Board in a new interview series, Beyond the Bio. In this series, Black Hat Review Board Members offer insight from their favorite exploits and pastimes to their most memorable Black Hat experiences.By Black Hat Staff , 3/14/20170 comments | Read | Post a Comment
In-cabin laptop ban and requirements to unlock devices for border patrol could have enterprises revisiting their on-device data policies.
By Ericka Chickowski Contributing Writer, Dark Reading, 3/31/201710 comments | Read | Post a Comment
Google engineer Halvar Flake told Black Hat Asia attendees that flaws in organizational structure and market power put enterprises at risk.
By Kelly Sheridan Associate Editor, Dark Reading, 3/30/20174 comments | Read | Post a Comment
GeekPwn bug bounty program aims to collect Internet of Things security vulnerabilities, and highlight mistakes to vendors. By Kelly Sheridan Associate Editor, Dark Reading, 2/13/20170 comments | Read | Post a Comment
Black Hat Europe researcher shows how hackers can conduct denial-of-service attacks on 4G cellular devices around the world.
By Kelly Sheridan Associate Editor, Dark Reading, 11/7/20160 comments | Read | Post a Comment
Researchers at Black Hat Europe this week will demonstrate a streamlined technique for spotting and identifying illicit narcotics, counterfeiters, and other scammer websites and operations.By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/2/20161 Comment | Read | Post a Comment
Jennifer Granick and Riana Pfefferkorn discuss lessons learned from the Apple-FBI case, and how security pros should be prepared if government data requests hit closer to home.By Dark Reading Staff , 10/31/20160 comments | Read | Post a Comment
Data analysis to be presented at Black Hat Europe highlights trends in communication between bad actors who gather in underground forums across the Dark Web.By Kelly Sheridan Associate Editor, Dark Reading, 9/29/20161 Comment | Read | Post a Comment
Move over Apple 'Walled Garden.' Windows 10's new antimalware scan interface halts scripts by signing code on the fly... but does it work? Security researcher Nikhil Mittal takes a look. By Sara Peters Senior Editor at Dark Reading, 9/21/20160 comments | Read | Post a Comment
Jamesha Fisher, Security Operations Engineer of GitHub, visits the Dark Reading News Desk at Black Hat to discuss her work making security more accessible to the uninitiated, and how a predominately white and male information security field can better support women and people of color.By Sara Peters Senior Editor at Dark Reading, 9/20/20163 comments | Read | Post a Comment
Jelle Niemantsverdriet of Deloitte explains how security improves if security tools and error messages educate users and 'put a smile on someone's face.'By Sara Peters Senior Editor at Dark Reading, 9/15/20161 Comment | Read | Post a Comment
Black Hat is the most technical and relevant global information security event series in the world. For more than 19 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global Briefings and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.www.blackhat.com