Ten Big Breaches In 2011
No one was immune: not social networks, not financial institutions, and not even security firms
SSL will evolve to meet requirements for e-commerce and mobile
PCI Rules Apply Even On Black Friday
Uptime might be the name of the game during the holiday shopping season, but retailers need to balance the focus with security and compliance best practices
APT Or Everyday Cybercrime? How To Tell
Of the many attacks corporate networks face daily, advanced persistent threats are the most serious. Consider these tips to tell which kind of attack you're facing and what to do about it.
Computer Crime Year In Review by Jennifer Granick
EFF's Civil Liberties Director, Jennifer Granick's Black Hat talk: Computer Crime Year in Review - MySpace, MBTA, Boston College and more. Granick discusses some special cases and the the application of legal statutes for them.
Lockpicking Forensics - Black Hat 2009
Destruction is still the most common way to break in somewhere. Datagram provides a talk on Lockpicking Forensics at Black Hat, covering how locks and picks work, various techniques, the affect of normal wear, lock and key analysis and investigation.
Hacking The Smart Grid - Black Hat 2009
FYRM Associates Principal Tony Flick presents research on hacking the smart grid. He talks about the components of the smart grid, the problems (both found and potential), and finally some solutions.
MANDIANT CSO Talks Threats To His Company and His Clients
Richard Bejtlich, CSO and VP of managed services, sits down with Dark Reading's Kelly Jackson Higgins at Black Hat USA to talk about the two hats he wears at the incident response company, and trends in attacks against enterprises and security firms.
Anatomy of a Zero Day Attack
Pacific Northwest National Laboratory CIO, Jerry Johnson, provides some lessons learned from the attacks on his organization in July -- a highly publicized attack on an organization that provides cyber security services for the Dept. of Energy.