Sign up for our weekly newsletter!
REGISTER NOW |
||
![]() |
|
|
SecurityNow.com Is Going to Black Hat![]() A few times a year, the security clan gathers to compare notes, hear about the latest research and renew human partnerships. This week, the security world gathers in Las Vegas at Black Hat to talk, learn and test the limits of modern skin moisturizers. SecurityNow.com will be at Black Hat this week talking to security professionals, see presentations on the latest in security research, walk the exhibition floor in search of the newest security technology and broadcast an episode of Voice of Security Radio live from the media center at Black Hat. I'll be live-tweeting the keynote address on Wednesday morning at 9:00 a.m. Pacific time (noon Eastern). Be sure to follow me at @kg4gwa on Twitter to see my take on the address and everything else going on at Black Hat. What are you interested in knowing about Black Hat? Are you going to be there yourself? Leave questions in the comment section here or send me a direct message on Twitter to find time to meet face-to-face at the Mandalay Bay Convention Center. I'll be interested in your take, as well. This has already been a busy year in security: What do you think we're going to see at Black Hat that will have an impact on the rest of the year? One of the great things about SecurityNow.com is the voice of the community -- let's hear yours when it comes to Black Hat 2017! — Curtis Franklin is the editor of SecurityNow.com. Follow him on Twitter @kg4gwa. |
The key to being more secure might well lie in the ability to slow down just a bit.
The year opens with a huge vulnerability. Of course there's a haiku to explain it all.
The readers of Security Now have weighed in on the idea of cybersecurity teams going on the offense against hackers. Hackers might want to start worrying.
A vulnerability in the way that Intel CPUs deal with memory could leave everyone using an Intel-based computer open to attack.
It's a new year filled with new threats in IT security. Rejoice!
Information Resources
upcoming Webinars
ARCHIVED
Leveraging a Risk-Based Approach to Vulnerability Management to Unify Security and Operations
Wednesday, February 20, 2019
11:00 am New York / 4:00 pm London Radio Shows
![]() like us on facebook
|
|
![]() |
||
![]() |
Security Now
About Us
Contact Us
Help
Register
Events
Supporting Partners
Twitter
Facebook
RSS
Copyright © 2019 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use in partnership with
|