conferences
Breaking the security of physical devices
In this podcast recorded at Black Hat USA 2014, Silvio Cesare, Director of Anti-Malware Engineering at Qualys, discusses the security measures of a number of household devices …
86% of hackers don’t worry about repercussions
Thycotic announced the results of a survey of 127 self-identified hackers at Black Hat USA 2014. The survey found that 86% of hackers are confident they will never face …
Continuous monitoring for your perimeter
Qualys Continuous Monitoring is a next-generation cloud service that gives you the ability to identify threats and unexpected changes in your Internet perimeter before they …
The dangers of backdoor passwords
In an increasingly connected world, backdoor passwords have large implications on the Internet of Things, the medical world and industrial control systems. While you might …
Square launches bug bounty program
Popular California-based financial services and mobile payments company Square has set up a bug bounty program on the HackerOne platform. The announcement was made at a panel …
How fast can security pros detect a breach?
Tripwire announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas. Industry research shows most breaches go undiscovered …
Blackphone rooted at DEF CON?
Blackphone, the recently released security-oriented smartphone, has apparently been rooted. The feat was executed at the DEF CON hacker conference, where Jon Sawyer …
A walk through Black Hat USA 2014
Here’s a walk through video of the Business Hall at Black Hat USA 2014. The video features: Qualys Firemon iBoss Crowdstrike Palo Alto Networks Shape Security Pwnie …
Critical 0-days found in CPE WAN Management Protocol
Check Point has released its findings of security concerns in CPE WAN Management Protocol (CWMP/TR-069) deployments, used by major ISPs globally to control business and …
Live open source security lab coming to Cyber Security EXPO
Cyber Security EXPO, part of IP EXPO Europe, is calling for contributors to the Cyber Hack, a live open source security lab arriving at the show this October. The Hack area …
Hackers to attack routers at DEF CON
A competition is scheduled for hackers and computer scientists from around the world to better protect consumers against widespread security vulnerabilities in wireless …
Sir Tim Berners-Lee to open IP EXPO Europe
In his first address to the core IT community of IP EXPO Europe, Sir Tim will outline his 2050 vision for the web and how businesses will use it for competitive advantage. …
Featured news
Sponsored
Don't miss
- 2024 Data Breach Investigations Report: Most breaches involve a non-malicious human element
- Securing your organization’s supply chain: Reducing the risks of third parties
- Understanding emerging AI and data privacy regulations
- reNgine: Open-source automated reconnaissance framework for web applications
- Women rising in cybersecurity roles, but roadblocks remain