Black Hat USA
July 30 - August 4, 2016
Mandalay Bay | Las Vegas, NV
Black Hat Europe
November 1-4, 2016
London UK
Black Hat Asia
March 28-31, 2017
Singapore
Event Updates
Black Hat Europe 2016:
How Artificial Intelligence Will Liberate Security
Black Hat Staff,
The security paradigm is shifting to one of security as a science with AI as the primary agent for that revolutionary change.
By John McClurg, Vice President and Ambassador-At-Large, Cylance , 10/24/2016
Comment0 comments  |  Read  |  Post a Comment
Black Hat Europe 2016:
The 7 Habits of Highly Effective Security Operations
Black Hat Staff,
Why cyber analysts spend nearly 75% if their time on false positives, and what to do about it.
By Black Hat Staff , 10/21/2016
Comment2 comments  |  Read  |  Post a Comment
Black Hat Europe 2016:
5 Best Practices for Defending Against a Cyberattack
Black Hat Staff,
The proactive management of cybersecurity relies on an intelligence-led approach that can either prevent a breach from happening, or make sure that it is quickly detected and remediated.
By Robert Anderson, Managing Director, Navigant, Cybersecurity Practice , 10/19/2016
Comment0 comments  |  Read  |  Post a Comment
More Event Updates
News & Commentary
4G Cellular Networks At Risk Of DoS Attacks
Kelly Sheridan, Associate Editor, InformationWeekNews
Black Hat Europe researcher shows how hackers can conduct denial-of-service attacks on 4G cellular devices around the world.
By Kelly Sheridan Associate Editor, InformationWeek, 11/7/2016
Comment0 comments  |  Read  |  Post a Comment
Threat Hunting: Going After The Big Game
Dark Reading Staff, CommentaryVideo
The Black Hat News Desk welcomes Jian Zhen from Endgame.
By Dark Reading Staff , 11/3/2016
Comment3 comments  |  Read  |  Post a Comment
Catching Online Scammers, Dealers & Drug Dealers With DNS
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researchers at Black Hat Europe this week will demonstrate a streamlined technique for spotting and identifying illicit narcotics, counterfeiters, and other scammer websites and operations.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/2/2016
Comment1 Comment  |  Read  |  Post a Comment
Preparing For Government Data Requests After Apple Vs. FBI
Dark Reading Staff, CommentaryVideo
Jennifer Granick and Riana Pfefferkorn discuss lessons learned from the Apple-FBI case, and how security pros should be prepared if government data requests hit closer to home.
By Dark Reading Staff , 10/31/2016
Comment0 comments  |  Read  |  Post a Comment
Partners In The Battle Against Cyberthreats
Dark Reading Staff, CommentaryVideo
George Karidis of CompuCom and Rodel Alejo from Intel stop by the Dark Reading News Desk.
By Dark Reading Staff , 10/6/2016
Comment0 comments  |  Read  |  Post a Comment
10 Hottest Sessions At Black Hat Europe 2016
Sean Martin, CISSP | President, imsmartin
A sneak-peek at some of the more intriguing Briefings at the upcoming conference in London.
By Sean Martin CISSP | President, imsmartin, 9/30/2016
Comment2 comments  |  Read  |  Post a Comment
Decrypting The Dark Web: Patterns Inside Hacker Forum Activity
Kelly Sheridan, Associate Editor, InformationWeekNews
Data analysis to be presented at Black Hat Europe highlights trends in communication between bad actors who gather in underground forums across the Dark Web.
By Kelly Sheridan Associate Editor, InformationWeek, 9/29/2016
Comment1 Comment  |  Read  |  Post a Comment
Improving Security Savvy Of Execs And Board Room
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Jeff Welgan describes how best to improve cybersecurity literacy throughout the C-suite.
By Sara Peters Senior Editor at Dark Reading, 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
D-FENSE! Using Research To Craft Effective Cyber Defenses
Dark Reading Staff, CommentaryVideo
A pair of experts from Imperva stops by the Dark Reading News Desk to chat.
By Dark Reading Staff , 9/23/2016
Comment3 comments  |  Read  |  Post a Comment
How Windows 10 Stops Script-Based Attacks On The Fly
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Move over Apple 'Walled Garden.' Windows 10's new antimalware scan interface halts scripts by signing code on the fly... but does it work? Security researcher Nikhil Mittal takes a look.
By Sara Peters Senior Editor at Dark Reading, 9/21/2016
Comment0 comments  |  Read  |  Post a Comment
How You Can Support InfoSec Diversity, Starting With The Colleagues You Already Have
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Jamesha Fisher, Security Operations Engineer of GitHub, visits the Dark Reading News Desk at Black Hat to discuss her work making security more accessible to the uninitiated, and how a predominately white and male information security field can better support women and people of color.
By Sara Peters Senior Editor at Dark Reading, 9/20/2016
Comment2 comments  |  Read  |  Post a Comment
Rise Of Machine Learning: Advancing Security With ML
Dark Reading Staff, CommentaryVideo
Hal Lonas of Webroot drops by the Dark Reading News Desk at Black Hat.
By Dark Reading Staff , 9/20/2016
Comment0 comments  |  Read  |  Post a Comment
The Future Of AI-Based Cybersecurity: It's Here Now
Dark Reading Staff, CommentaryVideo
Stuart McClure, president and CEO of Cylance, stops by the Dark Reading News Desk at Black Hat.
By Dark Reading Staff , 9/19/2016
Comment0 comments  |  Read  |  Post a Comment
Stop Blaming Users. Make Security User-Friendly.
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Jelle Niemantsverdriet of Deloitte explains how security improves if security tools and error messages educate users and 'put a smile on someone's face.'
By Sara Peters Senior Editor at Dark Reading, 9/15/2016
Comment1 Comment  |  Read  |  Post a Comment
Making The Dark Web Less Scary
Dark Reading Staff, CommentaryVideo
Lance James, chief scientist at Flashpoint, stops by the Dark Reading News Desk to share his thoughts about the Dark Web.
By Dark Reading Staff , 9/14/2016
Comment0 comments  |  Read  |  Post a Comment
Keep It Simple: Security For A Complex Enterprise
Dark Reading Staff, CommentaryVideo
Michelle Cobb of Skybox Security talks to Dark Reading about security management.
By Dark Reading Staff , 9/14/2016
Comment0 comments  |  Read  |  Post a Comment
Taking Down Impersonators: Methods For Combating Email Fraud
Dark Reading Staff, CommentaryVideo
Bob Adams, cybersecurity strategist at Mimecast, stops by the Black Hat News Desk.
By Dark Reading Staff , 9/14/2016
Comment0 comments  |  Read  |  Post a Comment
Wisdom From A Thought Leader: AppSec Best Practices
Dark Reading Staff, CommentaryVideo
The Black Hat News Desk chats with Jeff Williams, CTO at Contrast Security.
By Dark Reading Staff , 9/14/2016
Comment0 comments  |  Read  |  Post a Comment
Yes, Your Database Can Be Breached Through A Coffee Pot
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Aditya Gupta, CEO of Attify, talks about how to improve Internet of Things security and the very worst scenarios he's encountered in an IoT penetration test.
By Sara Peters Senior Editor at Dark Reading, 9/13/2016
Comment0 comments  |  Read  |  Post a Comment
Dan Kaminsky On How Not To Lose The Internet As We Know It
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Dan Kaminsky discusses how to improve the security and privacy of the Internet without destroying the openness and freedom to innovate that it has always provided.
By Sara Peters Senior Editor at Dark Reading, 9/12/2016
Comment0 comments  |  Read  |  Post a Comment
More Stories
Twitter Feed
Current Conversations
More Conversations
Black Hat
Black Hat is the most technical and relevant global information security event series in the world. For more than 19 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global Briefings and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
www.blackhat.com
White Papers
Video
Register for Dark Reading Newsletters
Current Issue
Five Things Every Business Executive Should Know About Cybersecurity
Don't get lost in security's technical minutiae - a clearer picture of what's at stake can help align business imperatives with technology execution.
Cartoon Contest