When it comes to the creation of this market, it all boils down to supply and demand. Jeremiah Grossman is nudging the supply along - letting people get a taste of it - and hopefully the market will soon start demanding it. In this article, Sean Martin explores the cyber guarantee portion of the topic and the ability to create a new market from scratch.
‘Compliance does not equal security’ was the mantra of this session called Two-Factor Isn’t Enough – We Show You Why. Ryan Rowcliffe of SecureAuth reminded us that merely having a two-factor authentication technology in place isn’t nearly safe enough because when it comes to convenience, people will almost always eschew security measures.
When the weakest link in a business’ IT security is “end users who…are too easily fooled by social engineering attacks,” how do you protect your organization? Here are two studies that show just how foolish people can be.
A company can’t be diversified if its people aren’t diversified. This panel of five top-level women in the security industry discusses why the number of females in infosec and tech companies is actually declining, the inherent biases we all have about people, and what can be done to remove the obstacles to attract – and retain – more qualified women to this growing field.
Cybersecurity only works if you actually implement it – otherwise, it’s like having a state-of-the art alarm system on your house but then leaving the bedroom window open for fresh air. Unfortunately, the weakest link in the security chain comes down to the end users.
There are no fewer than 256 companies (as of this writing) with reserved booths at Black Hat USA 2016 this year. As you plan your navigation of the hall to see that many vendors, there is a lot to consider. Sean Martin offers 5 tips and tricks to help Black Hat attendees make the most of their time on the Expo floor.
Previously, we brought you details of the Mobility, Microsoft, IoT and AppSec Briefings taking place at this year’s Black Hat 2016 event in Las Vegas. We've even given you a Top 10 list to help narrow things down a bit. Now comes the training and briefings from the woman’s point of view; Women in Cybersecurity takes the showcase stage here on IT Security Planet.
There are many ways to get pwned during the Black Hat conference. IT Security Planet is running a Twitter poll to see how people plan to protect themselves from the onslaught of attacks.
Surely at this stage the necessary travel plans are confirmed as July 30th is nearly upon us. Your destination must be Blackhat USA 2016 at the beautiful Mandalay Bay Resort and Casino, Las Vegas. If you haven’t already, register now, as trainings and sessions are filling fast.
Here are a few briefings which caught our eye whilst scanning the schedule at this year’s annual infosec gathering.
So who’s ready for the Black Hat USA 2016 conference at the beautiful Mandalay Bay Resort and Casino, Las Vegas? Get registered now, if you haven’t already, as places are filling fast.
The Black Hat Briefings are fast approaching at Mandalay Bay Resort and Casino, Las Vegas. The flights are booked and registration forms are completed in full. This conference, which brings scores of briefings to life each year, was created nearly 20 years ago to provide InfoSec professionals a place to gather and learn from the very best what the very latest risks and trends are in the information security world.