Advertisement
Top

Tag: Conference


Network security

7 Hot Cybersecurity Trends to Be Highlighted at Black Hat

July 8, 2019

Via: Dark Reading

Black Hat USA is fast approaching. With the full conference schedule online, now is the time for security pros to dive in and plan out their paths to exploring a wide range of learning opportunities. As with years past, the […]


Email security, Mobile, Privacy protection, Security

Apple Pledges Privacy, Beefs Up Security

June 13, 2019

Via: Dark Reading

Whether it’s from Apple fans, embedded marketing people, or actual developers, applause is an oft-heard feature of any keynote at Apple’s Worldwide Developers Conference. Yet the loudest applause at this year’s conference came not for some shiny feature, but for […]


Network security

Putin Pushes for Global Cybersecurity Cooperation

July 9, 2018

Via: Dark Reading

At a Moscow-based security conference, Russian President Vladimir Putin said countries should work together amid the rise of cyberthreats. Russian President Vladimir Putin called on countries to better cooperate in the fight against cyberattacks during his address at a Moscow […]


Cloud security

RSA Conference 2018 Recap: Building a Foundation for Tomorrow’s Cybersecurity

April 26, 2018

Via: Security Intelligence

The RSA Conference has gotten bigger and louder — not just because of the clamoring sounds of tens of thousands of attendees, but also due to the din of construction equipment as San Francisco works to rebuild the Moscone Center. […]


Network security

RSA Conference: CISOs’ top 4 cybersecurity priorities

April 4, 2018

Via: CSO Online

When cybersecurity executives head to the RSA Conference, they will be looking for information about threat intelligence, SOAPA, business risk, and changing security perimeters. I’ve spent a good amount of time talking to CISOs over the past few months to […]


Network security

First US Federal CISO Shares Security Lessons Learned

November 30, 2017

Via: Dark Reading

INSECURITY CONFERENCE – Washington, DC – Greg Touhill encouraged his audience of security leaders, whom he dubbed “the cyber neighborhood watch,” to swap war stories and lessons learned during his keynote at Dark Reading’s inaugural INSecurity conference, held this week […]


Network security

Comey Talks Strong Crypto, Silent on WikiLeaks

March 9, 2017

Via: Threat Post

FBI director James B. Comey today revived the Going Dark discussion during a keynote address at the Boston Conference on Cyber Security, saying it’s time for an adult conversation on the prevalence of strong encryption and how it hinders criminal […]


Malware

Who else crushed it at RSA?

February 27, 2017

Via: Malwarebytes

The theme for this year’s RSA Conference was the “Power of OpportUNITY”, and with more than 43,000 IT and security professionals in attendance—it truly was the gathering to bring our community together. Malwarebytes was proud to once again take part […]


Mobile security, Network security

RSA Unveils Business-Driven Security Offering

February 14, 2017

Via: Security Week

RSA, which since September is part of Dell Technologies, on Monday unveiled a new approach and product improvements designed to help organizations manage cyber risk. With its new Business-Driven Security architecture, RSA aims to provide organizations the tools needed to […]


Cloud security

Cloud security processes need to mature, says panel

September 12, 2016

Via: Computer Weekly

Cloud security processes in many companies are still relatively immature, according to a panel at the Cloudsec 2016 conference in London. “While most cloud suppliers have built in security, in business processes it is still very much something that is bolted on,” […]


Application security, Mobile security

Black Hat security conference trims insecure features from its mobile app

August 1, 2016

Via: CIO

Black Hat has disabled features of its mobile application because attackers could have logged in as legitimate attendees, posted messages in their names and spied on the messages they sent. The problem was discovered by mobile security vendor Lookout who […]


Virus & Malware

Virus Bulletin 2015

September 27, 2015

Via: virus-and-malware

At this time of year I’m usually getting ready to travel to #virus bulletin, maybe the year’s most important #conference for an anti-#malware researcher. The agenda looks as good as ever, though, with a keynote from Ross Anderson to kick […]


Threats & Malware

Design flaw in Intel processors opens door to rootkits, researcher says

August 7, 2015

Via: threats-and-malware

A design #flaw in the x86-#processor #architecture dating back almost two decades could allow attackers to install a #rootkit in the low-level firmware of computers, a security researcher said Thursday. Such malware could be undetectable by security products. The vulnerability […]


Vulnerabilities

Black Hat USA 2015: The full story of how that Jeep was hacked

August 7, 2015

Via: vulnerabilities

Recently we wrote about the now-famous hack of a Jeep Cherokee. At Black Hat USA 2015, a large security conference, researchers Charlie Miller and Chris Valasek finally explained in detail, how exactly that hack happened. At the start of their […]


Cyber-crime

Black Hat 2015: What to watch out for, besides cars and guns

August 4, 2015

Via: cyber-crime

The Black Hat conference in Las Vegas this week is a major event in the cybersecurity calendar, happening every summer, and delivering a large amount of fresh security knowledge as well as a wide range of security training. So what […]