Follow Dark Reading:
 August 06, 2020
LATEST SECURITY NEWS & COMMENTARY
What a Security Engineer & Software Engineer Learned by Swapping Roles
A security engineer and infrastructure engineer with Salesforce share lessons learned from their professional role reversal, and advice for people on both teams.
Pen Testers Share the Inside Story of Their Arrest and Exoneration
Coalfire's Gary De Mercurio and Justin Wynn share the inside story of their infamous arrest last year while conducting a contracted red-team engagement in an Iowa courthouse -- and what it took to clear their names.
Why Confidential Computing Is a Game Changer
Confidential Computing is a transformational technology that should be part of every enterprise cloud deployment. It's time to start unlocking the possibilities together.
Dark Reading Video News Desk Returns to Black Hat
UPDATED: Coming to you prerecorded from in front of carefully arranged bookcases around the world ...!
What to Tell Young People of Color About InfoSec Careers
CEO and founder of Revolution Cyber Juliet Okafor and Baker Hughes Director of Global OT Security Programs Paul Brager talk about the unique lessons and hard truths they provide when mentoring young black cybersecurity professionals.
MORE NEWS & COMMENTARY
HOT TOPICS
THURSDAY BRIEFINGS
All times are Pacific Times (GMT/UTC-7h}

Breaking Brains, Solving Problems:

Thursday, August 6 | 12:30pm-1:10pm Lessons Learned from two years of setting puzzles and riddles for InfoSec professionals.

Heroku Abuse Operations: Hunting Wolves in Sheep's Clothing

Thursday, August 6 | 12:30pm-1:10pm Allan and Spencer walk through the cat-and-mouse hunt for ever-evolving miscreant behavior hidden in the sea of legitimate users, build mechanisms to turn low value indicators into high value decisions, and show the value of "pushing left" to make the platform less hospitable for abuse.

MORE
COMMUNITY SESSIONS

All times are Pacific Time (GMT/UTC -7h)

The Black Hat NOC: Greatest Hits and Holy...Cows.

Thursday, August 6 | 1:30pm-2:30pm Come see how the NOC has been adjusted, adapted, and reinvented as the industry, and the potential threats have changed over the years. What technologies or trends worked for us, what didn't, and what decisions were our best and worst?


Mental Health Hackers: Contents Under Pressure

Thursday, August 6 | 11:00am-11:45am We need to start treating mental health issues just like any other health issue. Not only should we start learning and taking better care of our own mental health issues, there are things that employers should start working on improving, and the infosec community has begun taking those steps already.


FREE!

Come Say Hello at our Black Hat USA Booth

We’re giving away free passes to our Cybersecurity Crash Course at Interop, 2020 Cyber Threats Report, and a Virtual Meeting Backdrop.


Tech Resources
ACCESS TECH LIBRARY NOW

  • Making Zero-Trust Work for Work From Home

    In this Dark Reading webinar, learn how to make layered, zero-trust architecture work among today's business realities.

  • Cyber Attack Evasion Techniques

    When it comes to evasion techniques there's a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.