undefined MIN READ
Behind the Briefings: How Black Hat Sessions Get Chosen
Daniel Cuthbert and Stefano Zanero explain what the Black Hat review board is looking for in an abstract submission for the Briefings.
- Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
- What Ransomware Groups Look for in Enterprise Victims
- How to Use Threat Intelligence to Mitigate Third-Party Risk
- Everything You Need to Know About DNS Attacks
- How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment