Black Hat 2018: Swimlane and a Can of Whoop-@ss August 30, 2018 Hugh Taylor Off Articles and Opinion, Featured, If you’re in SecOps and feeling overwhelmed by an abundance of attackers and a shortage...
Black Hat 2018: Securing Unstructured Data August 29, 2018 Hugh Taylor Off Articles and Opinion, Featured, Ready for your post Black Hat 2018 eye-opener of the day? According to Brian Vecci,...
Using Policy to Foil the RATS in ICS August 28, 2018 Hugh Taylor Off Articles and Opinion, Featured, Xage Security just announced its new Policy Manager product, which can automatically enforce security policies...
Black Hat 2018: Attack Simulation August 28, 2018 Hugh Taylor Off Articles and Opinion, Featured, Inspector Clouseau, of Pink Panther fame, had Cato Fong, his manservant, attack him by surprise...
Black Hat 2018: Reducing Attack Surfaces August 26, 2018 Hugh Taylor Off Articles and Opinion, Featured, The theme of reducing attack surfaces emerged repeatedly at Black Hat 2018. While many cyber...
Black Hat 2018: The ICS Conversation August 24, 2018 Hugh Taylor Off Articles and Opinion, Featured, The subject of Industrial Control Systems (ISCs) came up frequently at Black Hat 2018. The...
Black Hat 2018 Profile: Fortanix August 23, 2018 Hugh Taylor Off Articles and Opinion, Featured, If you want to protect your data, you encrypt it. That’s a well-established countermeasure. We...
Black Hat 2018 Profile: NanoVMS August 21, 2018 Hugh Taylor Off Articles and Opinion, Featured, When you apply for life insurance, you have to disclose whether or not you smoke...
Black Hat 2018 Profile: Trend Micro’s Zero Day Initiative August 20, 2018 Hugh Taylor Off Articles and Opinion, Featured, Uncategorized, Trend Micro has been overseeing the Zero Day Initiative, the world’s largest vendor-agnostic bug bounty...
Crying Foul on the Antivirus Industry August 19, 2018 Hugh Taylor Off Articles and Opinion, Featured, As a cinephile (and former TV script executive), I can’t help myself. When CEO Steve...