Please turn on your JavaScript for this page to function normally.
GreySpark
Measuring IT security health with GreySpark

In this podcast recorded at Black Hat USA 2016, Brit Wanick, Vice President of Sales, FourV Systems, talks about measuring IT security health with GreySpark. GreySpark …

SimpleRisk
SimpleRisk: Enterprise risk management simplified

In this podcast recorded at Black Hat USA 2016, Josh Sokol, creator of SimpleRisk, talks about his risk management tool, which he presented at the Black Hat Arsenal. Written …

Armor
Data protection for any cloud, anywhere

In this podcast recorded at Black Hat USA 2016, Jeff Schilling, CSO at Armor, talks about Armor Anywhere, which provides user-friendly managed security, with visibility and …

Qualys remediate
Key elements for successfully prioritizing vulnerability remediation

New vulnerabilities are disclosed every day, amounting to thousands per year. Naturally, not all vulnerabilities are created equal. In this podcast recorded at Black Hat USA …

network
A closer look at IT risk management and measurement

In this podcast recorded at Black Hat USA 2016, Casey Corcoran, Partner, FourV Systems, talks about the most significant trends cyber security and risk management. He …

Qualys
Continuous security in the web application space

What we’re seeing in the market right now is increased consolidation among vendors. They’re buying each other, more products covering another vendor’s …

strategy
What’s your security strategy?

In this podcast recorded at Black Hat USA 2016 in Las Vegas, Chris Drake, CEO at Armor, talks about how corporate IT is being stretched thin. They have to tackle the corporate …

phishing
Multi-layered phishing mitigation

In this podcast recorded at Black Hat USA 2016, Eyal Benishti, CEO at IRONSCALES, talks about their multi-layered phishing mitigation solution, which brings together human …

keys
CRIME, TIME, BREACH and HEIST: A brief history of compression oracle attacks on HTTPS

The HEIST vulnerability was presented at Black Hat USA 2016 by Mathy Vanhoef and Tom Van Goethem. In this presentation, new techniques were presented that enhanced previously …

Qualys
Bringing security into IT and application infrastructures

In this podcast recorded at Black Hat USA 2016, Chris Carlson, VP of Product Management, Cloud Agent Platform at Qualys, talks about a new trend in bringing security into IT …

binary bomb
Malware hidden in digitally signed executables can bypass AV protection

Researchers have shown that it’s possible to hide malicious code in digitally signed executables without invalidating the certificate, and execute this code – all …

Windows
Remote Butler attack: APT groups’ dream come true

Microsoft security researchers have come up with an extension of the “Evil Maid” attack that allows attackers to bypass local Windows authentication to defeat full …

Don't miss

Cybersecurity news