Conference Coverage

News Stay informed about the latest enterprise technology news and product updates.

Black Hat 2017: Special conference coverage

Black Hat USA -- July 26-27, Las Vegas

Introduction

Join us at Black Hat 2017 as SearchSecurity editors cover all the breaking news from the twentieth anniversary event. Long a leading stage for revelation of significant new security breaks, this year's conference comes amid a sharp new focus on the nation-state dimension of cyberattacks and advanced defenses.

This year's show, from July 22-27 at the Mandalay Bay Convention Center in Las Vegas, covers the latest trends, technologies and threats -- but especially the threats. 

1News-

Latest from Las Vegas

Technologies such as machine learning, cloud-based IAM and micro-services continue to change the information security industry. New attacks and expanding attack surfaces up the ante for incident detection and response. At its twentieth anniversary, Black Hat USA is among the longest-running enterprise security conferences, but the news will be as fresh, controversial, and unnerving as ever.

News

Cybersecurity skills gap fixes must support minorities

A new survey shows a majority of organizations are facing a cybersecurity skills gap and experts say more focus on women and minorities could be key to finding talent. Continue Reading

News

Flawed Broadcom Wi-Fi chipsets get a fix, but flaw remains a mystery

Broadpwn, a flaw in Broadcom Wi-Fi chipsets, is patched, but Google withholds details. Plus, the latest in the antivirus drama between the U.S. and Russia, and more. Continue Reading

News

At Black Hat 2017, an industry hits a milestone and finds new directions

Long a conference that has thrived on technical sophistication and nuanced attacks, Black Hat USA 2017 in Las Vegas also found room for softer themes. Continue Reading

News

Stamos preaches defensive security research in Black Hat keynote

Facebook's Alex Stamos used his Black Hat 2017 keynote to address a wide variety of issues, including defensive security research and diversity in the infosec community. Continue Reading

News

Who are the Shadow Brokers? Signs point to an intelligence insider

At Black Hat 2017, security researcher Matt Suiche analyzed the Shadow Brokers dumps, postings and behavior to get to the bottom of one of the infosec industry's biggest questions. Continue Reading

News

2017 cybersecurity trends at the Black Hat conference

This week, bloggers look into 2017 cybersecurity trends leading up to the Black Hat conference, Movidius deep learning and Mist's approach to WLAN. Continue Reading

News

Experts debate Vulnerabilities Equities Process disclosure

Experts debated how the government should weigh disclosure in the Vulnerabilities Equities Process and whether to err on the side of offense or defense. Continue Reading

2Cyberattacks-

Vulnerabilities and attack methods

Understanding vulnerabilities and attack methods is critical to responding to cyberattacks, whether dealing with botnets or ransomware, or anything else. In this ever-changing threat landscape, enterprises and security companies must constantly stay informed. Find out which techniques and vulnerabilities threat actors are using now, and what experts at Black Hat 2017 say should be done to stop them.

News

Industroyer malware a turning point for ICS security

Security researchers at Black Hat 2017 analyzed the Industroyer malware, the attack on Ukraine's power grid and what it means for industrial control system security in the U.S. Continue Reading

News

Phishing research shows troubling trends for enterprise users

Karla Burnett of Stripe presented sobering results of phishing research from her company at Black Hat 2017, suggesting phishing training is ineffective against today's threats. Continue Reading

News

Cyber-risk analysis, time are keys to infosec says game theory

Analyzing infosec through the lens of game theory shows that cyber-risk analysis and wasting attacker time may be highly effective cybersecurity strategies. Continue Reading

News

Breaking down the Broadpwn exploit, world's first Wi-Fi worm

At Black Hat 2017, Exodus Intelligence researcher Nitay Artenstein unveiled the Broadpwn exploit, which he called the world's first Wi-Fi worm and which puts billions of iOS and Android devices at risk. Continue Reading

3Hot topics-

Black Hat encounters

Find out what the experts have to say on the hottest topics in cybersecurity as our reporters and editors connect with attendees at Black Hat 2017.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...

Close