Black Hat

Guide to the latest Black Hat 2020 Conference news

Last updated:August 2020

Editor's note

This year's Black Hat conference brought together top technical experts, thought leaders, innovative vendors and cybersecurity pros. For over 20 years, Black Hat has been a place to share research, development and trends. And though in 2020 Black Hat went virtual, this year was no different. SearchSecurity reporters and editors were there on hand to keep you informed on what's new in the security community.

Several days of training sessions opened the event; sessions covered an array of topics, including cloud security, detection and response essentials, advanced attack methods and response tactics, and pen testing and malware analysis.

After two timely keynote speeches -- on election security and online disinformation -- the briefing portion of the conference began. Its packed schedule offered in-depth, vendor-neutral presentations on every imaginable cybersecurity topic. 

Our reporters covered the key developments from Black Hat 2020 and gathered responses from expert attendees, too.

1Cybersecurity in a democracy

In this election year, cybersecurity is a key concern. At Black Hat 2020, experts delved into the weak links in election security and what can be done to ensure a fair and honest US election.

2New exploits and response tactics

Informed defense begins with a clear picture of the threat. At BlackHat 2020, presenters covered key vulnerabilities, including the "human factor," and how hackers now exploit them.

3Pre-conference coverage

Black Hat USA was virtual in 2020, but it remained an important place for information security professionals to gather and discuss the latest trends in their field, from emerging threats to innovative tools and techniques. Learn about Black Hat 2020 with this overview of the revised plan for the conference and recent coverage of key cybersecurity topics, including our reporters' reflections on the reality of virtual events in the pandemic era.

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close