Dark Reading, Black Hat Partner To Produce Daily Conference NewsletterDark Reading, Black Hat Partner To Produce Daily Conference Newsletter
Dark Reading newsletter subscribers, conference attendees will receive three days of Black Hat show coverage
July 24, 2012
From today through Thursday, subscribers to Dark Reading's daily and weekly email newsletters and all Black Hat attendees will receive a bonus newsletter: The Black Hat Daily News, powered by Dark Reading.
This is the first-ever daily show newsletter to be published jointly by Dark Reading and Black Hat, which are partner organizations under the same parent company, UBM Technology. For three days, Dark Reading and Black Hat will offer the best of news, information, and event coverage from Black Hat USA 2012, which takes place in Las Vegas this week.
The newsletter will offer a cross-section of coverage from this year's Black Hat conference, one of the security industry's premier events and the site of a broad range of vulnerability disclosures and proofs of concept that demonstrate potential cybersecurity threats.
This year's conference features presentations on many new areas of vulnerability, including air-traffic control systems and the smart meters used by local utilities. For a full list of Dark Reading's coverage of the show so far, check out our Black Hat coverage page.
The joint newsletter will deliver our latest coverage of the show -- including new vulnerability and threat data -- directly to the email boxes of Dark Reading newsletter subscribers and Black Hat attendees. If you'd like to receive Dark Reading daily or weekly newsletters, subscribe now.
We hope you'll enjoy the bonus Black Hat Daily News. As always, if you'd prefer not to receive it, you can also choose to opt out.
Welcome to Black Hat week! Whether you're at the show or monitoring it from your office, we'll bring you the latest news and information as it happens. Check our site frequently this week -- there'll be new articles posted all day and all week long.
Read more about:Black Hat News
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023