Blog Posts Tagged with "Black Hat Conference"


Three Key Take-Aways from Black Hat Europe 2012

March 18, 2012 Added by:Rafal Los

Every year we see tons of new development frameworks from IP telephony to something else the business wants - mobility, cloud, consumerization - that information security professionals only start to address and understand just as they're starting to go out of style...

Comments  (0)


What Do You Call a BlackHat in Amsterdam?

March 16, 2012 Added by:Javvad Malik

It was my first BlackHat and I’d agreed to cover the event for Infosec Island. Those in attendance would have seen me with Jim Shields of Twist & Shout lugging around camera’s lights, microphones trying to convince people to say a few words to the camera...

Comments  (1)


NETpeas is Taking Infosec Island to Black Hat Europe

February 02, 2012 Added by:Infosec Island Admin

NETpeas is sponsoring Infosec Island's presence at the Black Hat Europe conference in Amsterdam. The Island's Javvad Malik will be on site conducting video interviews and interjecting his trademark brand of humor while exploring cutting edge infosec trends and developments...

Comments  (1)


Top Ten Information Security Industry All-Stars

November 04, 2011 Added by:Headlines

Messmer's list is comprised of those "who year after year demonstrate the specialized skills that make them worth listening to". Several recently gave presentations at Hacker Halted and at Black Hat, and Infosec Island was fortunate enough to have conducted video interviews with them...

Comments  (1)


Black Hat USA 2011 Presenters - A Live Webcast

August 24, 2011 Added by:Headlines

The organizers of the Black Hat USA 2011 conference which took place earlier this month are inviting those who attended and those who missed the event to join them for a live webcast featuring some of the conference's speakers. The free webcast airs on Thursday, Aug 25, 2011...

Comments  (0)


Black Hat’s Place in Enterprise Information Security

August 17, 2011 Added by:Robb Reck

Throughout the Black Hat briefings, I didn’t once hear the words “defense in depth” or “return on investment.” What I got instead is examples of how the bad guys are going to break into specific systems. Black Hat doesn’t have a management track, the focus is on hands-on attacks and of systems...

Comments  (3)


Agnitio v2.0 and Mobile Apps

August 17, 2011 Added by:Security Ninja

Regardless of the resource exposure based on the arguments to the creation function, malicious applications or malicious users that have root access to the device will be able to read or write to anything on the device. Truly sensitive data should never be stored on the device itself...

Comments  (0)


Black Hat OSPF Vulnerabilities: Much Ado about Nothing

August 11, 2011 Added by:Stefan Fouant

There is some merit to what these researchers have found and to a protocol junkie like myself. However, what they've completely overlooked is the first tenet of information security which is to ensure the physical environment is properly secured...

Comments  (0)


Lessons from Black Hat - It's Easier to be the Bad Guy

August 08, 2011 Added by:Rafal Los

This is real-life attacking. Attackers have time on their side, and know that it is human nature to over-protect the things we value, but to forget to protect those things that we feel are not-so-important... even though they are often connected to those super-critical things...

Comments  (0)


DEFCON Panel: Confronting Aaron Barr, Anonymous, and Ourselves

August 08, 2011 Added by:Infosec Island Admin

Within the security community, we now face a paradigm shift that only recently has exploded onto the collective conscious. We are the new front line on the 5th battlespace. Terrorists, Spies, Nation States, Individuals, Corporations, and now ‘collectives’ are all waging war online...

Comments  (7)


Black Hat USA 2011, ISC2 and the Shady Rat

August 07, 2011 Added by:Boris Sverdlik

Information Security is a funny animal, what other industry can you mass market something that does absolutely nothing and have the product sell itself due to marketing? Why wouldn't you throw sex into the mix? All I can say is... RIGHT ON McAfee! Next year get some unicorns with boobs...

Comments  (0)


PLC Controlers, Stuxnet, and Kinetic Attacks: Black Hat 2011

August 04, 2011 Added by:Infosec Island Admin

Today we have a hacker community out there able to get their hands on code easily and even perhaps the PLC systems themselves to create even more exploits. Add to this that many SCADA systems have been connected to the Internet (as they should NEVER BE) ripe for attack and we have a big problem...

Comments  (1)


Interview Lineup for Black Hat in Las Vegas

August 02, 2011 Added by:Anthony M. Freed

While this is a working trip with little leisure time, I do get to enjoy a fabulous view from my hotel room here at Caesars Palace, compliments of the Black Hat event organizers and the wonderful folks over at Qualys - one of the event's premier sponsors. The video interview lineup is as follows...

Comments  (0)


Black Hat Vegas 2011 Video Interview Opportunity

July 12, 2011 Added by:Infosec Island Admin

Infosec Island will be conducting a series of video interviews with companies and vendors at the Black Hat USA 2011 conference in Las Vegas, NV. The interviews offer the opportunity for companies to highlight their knowledge of emerging trends in the information security field...

Comments  (0)


Infosec Island Call for Interviews at Black Hat Vegas

July 07, 2011 Added by:Infosec Island Admin

Infosec Island will be conducting a series of short video interviews with select presenters and vendors at the Black Hat USA 2011 conference in Las Vegas, NV. The interviews offer the opportunity for subjects to highlight their knowledge of emerging trends in the information security field...

Comments  (0)

Page « < 1 - 2 > »