Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:13 AM

Black Hat's Video Review

One-on-one interviews offer a new view on Black Hat's key issues

5:13 PM -- Not everything that happened at the Black Hat conference in Las Vegas earlier this month stayed in Vegas. We managed to get at least a little bit of it on film.

If you scroll down to the DRTV section of the Dark Reading home page, you'll find eight new video clips, each featuring a one-on-one interview with one of the most prominent speakers at Black Hat.

These short videos (about six to seven minutes each) offer short overviews of some of the key vulnerabilities and issues discussed at the conference and an up-close-and-personal look at some of the industry's top security researchers.

Here's your chance to see back-to-back interviews with Joanna Rutkowska and Tom Ptacek, whose debate over rootkit detection was one of the most controversial at the Black Hat conference. You'll also see exclusive video interviews with cyberwar expert Richard Clarke and Jim Christy, director of futures exploration at the Department of Defense.

We'll be adding these videos to our larger player, which currently is playing our Black Hat Vegas overview video, sometime next week.

OK, it's not as good as being at Black Hat, but it's the next best thing. And hey, at least we don't make you go through a mile-long casino to get there.

— Tim Wilson, Site Editor, Dark Reading

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-07
U.S. National Security Agency (NSA) Emissary 5.9.0 allows an authenticated user to upload arbitrary files.
PUBLISHED: 2021-05-07
U.S. National Security Agency (NSA) Emissary 5.9.0 allows an authenticated user to delete arbitrary files.
PUBLISHED: 2021-05-07
The ConsoleAction component of U.S. National Security Agency (NSA) Emissary 5.9.0 allows a CSRF attack that results in injecting arbitrary Ruby code (for an eval call) via the CONSOLE_COMMAND_STRING parameter.
PUBLISHED: 2021-05-07
Artica Pandora FMS 742 allows unauthenticated attackers to perform Phar deserialization.
PUBLISHED: 2021-05-07
A SQL injection vulnerability in the pandora_console component of Artica Pandora FMS 742 allows an unauthenticated attacker to upgrade his unprivileged session via the /include/chart_generator.php session_id parameter, leading to a login bypass.