Black Hat USA
July 30 - August 4, 2016
Mandalay Bay | Las Vegas, NV
Black Hat Europe
November 1-4, 2016
London UK
Black Hat Asia
March 28-31, 2017
Singapore
Event Updates
Black Hat USA 2016: Locking Down Your Platform Security
Black Hat Staff,
Only 38% of international organizations reveal they feel prepared to handle a sophisticated cyberattack, according to ISACA International (2015 Global Cybersecurity Status Report). The refinement of hacking technology is continuously evolving and learning how to heighten your security measures is critical. Not taking an active role in improving platform security could put your company’s proprietary information at risk.
By Black Hat Staff , 5/3/2016
Comment0 comments  |  Read  |  Post a Comment
Black Hat Europe 2015: Just the Attacks, Ma'am
Black Hat Staff,
Allow us to channel an early 2000, sweating, hyperkinetic Steve Ballmer: exploits, exploits, exploits, exploits! Today's Black Hat Europe 2015 Briefing highlights are all about novel and sometimes devastating new attacks against systems of all kinds. Can they get you as pumped up as Steve? Let's find out.
By Black Hat Staff , 10/27/2015
Comment0 comments  |  Read  |  Post a Comment
Black Hat Europe 2015: Gaps in the Corporate Armor
Black Hat Staff,
In today's Intel Update, we're going big... enterprise big, with a selection of Black Hat Europe 2015 Briefing highlights that focus on vulnerabilities affecting large organizations. Few targets are more tempting to criminals (or have more to lose) so let's take a peek at a few promisingly tender spots tucked behind corporate veils.
By Black Hat Staff , 10/20/2015
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
10 Newsmakers Who Shaped Security In the Past Decade
Kelly Jackson Higgins, Executive Editor at Dark Reading
In celebration of Dark Reading’s 10th anniversary, we profile ten people whose actions influenced and shaped the trajectory of the industry – for better or for worse -- in the past ten years.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/28/2016
Comment0 comments  |  Read  |  Post a Comment
15 Cybersecurity Lessons We Should Have Learned From 2015, But Probably Didn't
Sara Peters, Senior Editor at Dark ReadingNews
Another infosec year is almost in the books. What did all the breaches, vulnerabilities, trends, and controversies teach us?
By Sara Peters Senior Editor at Dark Reading, 12/28/2015
Comment7 comments  |  Read  |  Post a Comment
The Youthful Side Of Hacking
Peter Gyongyosi, Product Manager, BalabitCommentary
If the iconic 1955 movie Rebel Without a Cause was remade today, would James Dean be a computer hacker?
By Peter Gyongyosi Product Manager, Balabit, 11/25/2015
Comment10 comments  |  Read  |  Post a Comment
We Need A New Word For Cyber
John B. Dickson, CISSP,  Principal, Denim GroupCommentary
It’s time to find an alternative for 'cyber' (an adjective or noun) before the term – like 'google' -- becomes a verb.
By John B. Dickson CISSP, Principal, Denim Group, 11/23/2015
Comment6 comments  |  Read  |  Post a Comment
Solving Security: If You Want Something New, Stop Doing Something Old
Marilyn Cohodas, Community Editor, Dark ReadingNews
Black Hat Europe keynoter Haroon Meer tells security pros to work smarter, think out of the box, and speak out to the C-suite.
By Marilyn Cohodas Community Editor, Dark Reading, 11/12/2015
Comment0 comments  |  Read  |  Post a Comment
New 4G LTE Hacks Punch Holes In Privacy
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Black Hat Europe researchers to demonstrate newly found flaws in 4G mobile that expose privacy and disrupt phone service.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/9/2015
Comment0 comments  |  Read  |  Post a Comment
Cybersecurity Skills Gap: Too Good To Be True For Job Seekers?
Marilyn Cohodas, Community Editor, Dark ReadingCommentary
New track at Black Hat Europe explores the special challenges of managing an information security career for both job hunters and job hirers.
By Marilyn Cohodas Community Editor, Dark Reading, 11/9/2015
Comment0 comments  |  Read  |  Post a Comment
AndroBugs: A Framework For Android Vulnerability Scanning
Sara Peters, Senior Editor at Dark ReadingNews
At Black Hat Europe next week, a researcher will present a framework he says is more systematic than the vulnerability scanners popping up on the market.
By Sara Peters Senior Editor at Dark Reading, 11/4/2015
Comment0 comments  |  Read  |  Post a Comment
How Hackers Can Hack The Oil & Gas Industry Via ERP Systems
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researchers at Black Hat Europe next month will demonstrate how SAP applications can be used as a stepping-stone to sabotage oil & gas processes.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/28/2015
Comment3 comments  |  Read  |  Post a Comment
The Internet of Things: It’s All About Trust
Kevin Bocek, VP Security Strategy & Threat Intelligence, VenafiCommentary
As billions of devices come online, it will be critical to protect the keys and certificates we use for authentication, validation, and privileged access control.
By Kevin Bocek VP Security Strategy & Threat Intelligence, Venafi, 10/16/2015
Comment1 Comment  |  Read  |  Post a Comment
More Reasons To Drop The War On Encryption
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Rod Beckstrom, founding director of the US National Cybersecurity Center visits the Dark Reading News Desk at Black Hat to discuss cybercrime legislation, takedown operations, and why law enforcement should drop the war on encryption.
By Sara Peters Senior Editor at Dark Reading, 10/9/2015
Comment15 comments  |  Read  |  Post a Comment
Defending & Exploiting SAP Systems
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Juan Pablo Perez-Etchegoyen, CTO of Onapsis, joins the Dark Reading News Desk at Black Hat to discuss the technological and organizational challenges of SAP security.
By Sara Peters Senior Editor at Dark Reading, 10/7/2015
Comment2 comments  |  Read  |  Post a Comment
Segmentation: A Fire Code For Network Security
TK Keanini, CTO, LancopeCommentary
New technologies like software-defined segmentation are making it easier to prevent a compromise from spreading by separating users and network resources into zones.
By TK Keanini CTO, Lancope, 10/5/2015
Comment0 comments  |  Read  |  Post a Comment
A Wassenaar Arrangement Primer, With Katie Moussouris
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
The chief policy officer for HackerOne joins the Dark Reading News Desk at Black Hat to explain how the security community is working to prevent a policy 'dragnet' that would injure American infosec companies and researchers.
By Sara Peters Senior Editor at Dark Reading, 10/5/2015
Comment0 comments  |  Read  |  Post a Comment
What Security Pros Really Worry About
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Editor-in-Chief Tim Wilson visits the Dark Reading News Desk to report what security pros have told us in latest Black Hat and Dark Reading surveys about their priorities and what keeps them from them.
By Sara Peters Senior Editor at Dark Reading, 10/2/2015
Comment0 comments  |  Read  |  Post a Comment
Getting The Most From Your Security Investments
Kelley Damore, CommentaryVideo
In an interview at Black Hat, Shehzad Merchant, CTO of Gigamon, shares his thoughts with the Dark Reading News Desk on how CISOs can get the most out of their technology investments when it comes to fighting breaches.
By Kelley Damore , 9/28/2015
Comment0 comments  |  Read  |  Post a Comment
Keep Your Digital Assets Safe
Brian Gillooly, Vice President, Event Content & Strategy, UBM TechCommentaryVideo
Arian Evans, VP of product strategy at RiskIQ, talks to the Dark Reading News Desk at Black Hat about RiskIQ’s new online digital asset inventory discovery and security platform, Enterprise Digital Footprint.
By Brian Gillooly Vice President, Event Content & Strategy, UBM Tech, 9/28/2015
Comment0 comments  |  Read  |  Post a Comment
What Companies Want In A CISO
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Joyce Brocaglia founder of the Executive Women's Forum and CEO of Alta Associates joins the Dark Reading News Desk at Black Hat to discuss closing the gender gap in security and what companies are looking for in a CISO.
By Sara Peters Senior Editor at Dark Reading, 9/23/2015
Comment0 comments  |  Read  |  Post a Comment
Dan Kaminsky's Visions Of The CISO's Future
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Dan Kaminsky, chief scientist and founder of White Ops, visits Dark Reading News Desk at Black Hat to explain a 'fairly controversial' opinion about how to fix the security skills shortage, and why CISOs' budgets will double, then double again.
By Sara Peters Senior Editor at Dark Reading, 9/16/2015
Comment0 comments  |  Read  |  Post a Comment
Hacking Physical Systems 101
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Jason Larsen of IOActive joins the Dark Reading News Desk at Black Hat to talk about the fundamentals of cyber-physical attacks
By Sara Peters Senior Editor at Dark Reading, 9/14/2015
Comment0 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 17 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global Briefings and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Video
Register for Dark Reading Newsletters
Current Issue
Understanding & Managing the Mobile Security Threat
Mobile devices are increasing IT security risk. Is your enterprise ready?
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: It's A Dog's Life: Caption Contest Winners Announced