Vulnerabilities / Threats // Advanced Threats
8/4/2014
04:24 PM
Tim Wilson
Tim Wilson
Commentary
50%
50%

Dark Reading Plans Special Coverage Of Black Hat USA 2014

Radio shows, daily newsletter, and panel sessions highlight Dark Reading's comprehensive coverage of the Black Hat conference.

LAS VEGAS, NEVADA — The Black Hat USA 2014 conference is under way here this week, and Dark Reading is preparing a broad range of special coverage for this year's show.

To begin with, we have already posted more than 30 session previews, speaker announcements, radio show broadcasts, and other items about the show. You'll find all of our show coverage -- both today and all through this exciting week -- on Dark Reading's special Black Hat News page, which is now a regular feature of the Dark Reading site. On this page, you will find a constant stream of news from the show, including news stories, interviews, and onsite commentary from our editorial team and from expert contributors who are here in Las Vegas.

On Tuesday, editors Kelly Jackson Higgins and Tim Wilson will be doing live interviews with top security industry speakers at the annual Black Hat Executive Summit, an invitation-only gathering of IT security exectives from around the globe. Among the interviews are Phyllis Schneck, Deputy Under Secretary for Cybersecurity at the Department of Homeland Security's National Protection and Programs Directorate; Rod Beckstrom, Chief Security Advisor at Samsung and former President and CEO of ICANN; and Paul Vixie, CEO of Farsight and member of the Internet Hall of Fame.

On Wednesday and Thursday, the Dark Reading team will launch the first-ever edition of its Black Hat Radio program, which will offer live interviews with top speakers from the conference. Among the interviews are Jim Reavis, co-founder of the Cloud Security Alliance and Tom Cross, Director of Security Research at Lancope, who will discuss their presentations at Black Hat. Check the Dark Reading Radio section of the DR homepage for the latest schedule of radio shows and interviews.

On Thursday, Dark Reading will sponsor two special workshops on security research: The Future of Responsible Disclosure and Attribution: What It Means For Enterprise Security. The disclosure panel will focus on how researchers reveal security vulnerabilities and features experts Tod Beardsley of Rapid7 and Metasploit; Dino Dai Zovi of @ Square; Vinnie Liu of Bishop Fox; and Katie Moussouris of HackerOne. The attribution panel will focus on the nature and value of identifying your attacker and features Adam Meyers of CrowdStrike; Chris Nutt of Mandiant/FireEye; Chris Porter of the Verizon Cyber Intelligence Center; and Lucas Zaichkowsky of AccessData.

On Tuesday, Wednesday and Thursday, Dark Reading will send out a daily newsletter to its subscribers as well as Black Hat conference attendees. The newsletter, which will feature show-focused news and commentary as well as highlights of each day's Black Hat events, will be mailed automatically to Dark Reading newsletter subscribers. If you have not subscribed and would like to receive the newsletters, you can sign up here.

During the course of this Black Hat week, as well as later this month, Dark Reading will add many more news stories, columns, slide shows, photos, and radio broadcasts to its archive of Black Hat coverage. For all the latest from the show, as well as the opportunity to comment and add to the discussion, keep an eye on Dark Reading in the days ahead. We look forward to the conference!

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7286
Published: 2014-12-22
Buffer overflow in AClient in Symantec Deployment Solution 6.9 and earlier on Windows XP and Server 2003 allows local users to gain privileges via unspecified vectors.

CVE-2014-8896
Published: 2014-12-22
The Collaboration Server in IBM InfoSphere Master Data Management Server for Product Information Management 9.x through 9.1 and InfoSphere Master Data Management - Collaborative Edition 10.x through 10.1, 11.0 before FP7, and 11.3 and 11.4 before 11.4 FP1 allows remote authenticated users to modify ...

CVE-2014-8897
Published: 2014-12-22
Cross-site scripting (XSS) vulnerability in the Collaboration Server in IBM InfoSphere Master Data Management Server for Product Information Management 9.x through 9.1 and InfoSphere Master Data Management - Collaborative Edition 10.x through 10.1, 11.0 before FP7, and 11.3 and 11.4 before 11.4 FP1 ...

CVE-2014-8898
Published: 2014-12-22
Cross-site scripting (XSS) vulnerability in the Collaboration Server in IBM InfoSphere Master Data Management Server for Product Information Management 9.x through 9.1 and InfoSphere Master Data Management - Collaborative Edition 10.x through 10.1, 11.0 before FP7, and 11.3 and 11.4 before 11.4 FP1 ...

CVE-2014-8899
Published: 2014-12-22
Cross-site scripting (XSS) vulnerability in the Collaboration Server in IBM InfoSphere Master Data Management Server for Product Information Management 9.x through 9.1 and InfoSphere Master Data Management - Collaborative Edition 10.x through 10.1, 11.0 before FP7, and 11.3 and 11.4 before 11.4 FP1 ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.