Dark Reading Video News Desk Returns to Black Hat

  /     /     /  
Publicated : 23/11/2024   Category : security


Dark Reading Video News Desk Returns to Black Hat


UPDATED: Coming to you prerecorded from in front of carefully arranged bookcases around the world ...!



UPDATED Aug. 6, 2020 -- Usually, the Dark Reading News Desk comes to you each year live from sunny Las Vegas at the lovely Mandalay Bay hotel with a lineup of live video interviews with the greatest researchers about what theyre presenting at Black Hat USA. This year, the situation is a little different.
For 2020, Black Hat USA has transformed into Black Hat Virtual, moving out of Vegas and onto the Internet. And when the action kicks off, the Dark Reading News Desk team will be there. (The desk wont.)
Interviews will begin going live at Black Hat Virtual and on DarkReading.com Wednesday, Aug. 5, at 2 p.m. ET/11 a.m. PT. Black Hat Virtual attendees will be able to find interviews by
visiting the conferences Dark Reading News Desk tab
.
Everyone else -- keep your eyes on Dark Reading. Well update this page with new links as videos become available.
Heres the programming schedule:
DAY 1: Wednesday, August 5
WATCH NOW -- Attack of the Clone
: Tamaghna Basu tells us how he created an AI bot to mimic him, how it could be used in social engineering attacks, and what the experience taught him about the value of true human connections.
WATCH NOW -- Building Cybersecurity Strategies in Sub-Saharan Africa
: Evelyn Kilel and Laura Tich of Shehacks Ke discuss how they are working to build cybersecurity strategies that suit the needs and capabilities of developing nations. (For further reading, see
Kelly Sheridans piece on Dark Reading
.)
WATCH NOW -- Russian Election Interference: Whats Next?
: Nate Beach-Westmoreland takes a look back at the past 10 years of Russian election interference and disinformation campaigns. What can we learn from the past, and what should we expect as the 2020 US presidential election approaches?
WATCH NOW
--
(
Sponsored)
Voatz Delivers Multi-Layered Security to Protect Electronic Voting

While electronic voting has been plagued by fears of tampering or fraud, Voatz is looking to make the process more transparent and auditable, according to company founder Nimit Sawhney. He offers learning points from three recent pilots that highlight how governments can improve the integrity and better protect the voting process and its data. (For further reading, download 
this whitepaper
, State-of-the-Art Security Performs First-Rate Threat Mitigation in Convention Elections.)
3:10 ET -- HEALTHCARE SECURITY: A Deeper Look
WATCH NOW -- A Paramedics Guide to Cybersecurity
:
In this segment, the Dark Reading News Desk speaks to several guests about healthcare cybersecurity. We begin with Rich Mogull, infosec pro and paramedic, for a discussion about what lessons cybersecurity can learn from emergency medical services and the parallels that already exist. (For more,
see Kelly Sheridans piece on Dark Reading
.)
WATCH NOW -- How An Electronic Medical Record System Flaw Exacerbated the Opioid Crisis
: Mitch Parker, CISO of Indiana University Health, explains how healthcare appsec vulnerabilities and abuse can go undetected in small medical centers -- at great cost.
WATCH NOW -- A Most Personal Threat: Implantable Medical Devices
:
Alan Michaels, director of the Electronic Systems Lab at the Virginia Tech Hume Center, explains why implanted medical devices could pose a threat to secure communication facilities. (For more,
see Curt Franklins piece on Dark Reading
.)
WATCH NOW -- HealthScare:

Prioritizing Medical AppSec Research
: Seth Fogie, information security director at Penn Medicine, explains what healthcare app vulnerabilities really matter in the day-to-day business of providing patient care.
WATCH NOW -- (Sponsored)
Synopsys: Why Security-Minded Companies Are Transitioning to DevSecOps

For too long, developers have had to weigh the tradeoffs between software security and feature development. But as DevSecOps continues to gain momentum over application security, organizations realize that adopting security in software development neednt be a drag on productivity, says Tim Mackey from the Synopsys Cybersecurity Research Center.
WATCH NOW -- Pen Testers Who Got Busted for Doing Their Jobs Tell All

Coalfires Gary De Mercurio and Justin Wynn share the inside story of their infamous arrest last year while conducting a contracted red team engagement in an Iowa courthouse -- and what it took to clear their names.
WATCH NOW -- 
(
Sponsored) SynerComm Reboots a Security Staple with Continuous Pen Testing

Penetration testing has evolved well beyond a couple guys you hire to try and break into your network, according to SynerComms Brian Judd. In addition to a service that offers round-the-clock pen testing, SynerComm also provides purple team testing, effectively splitting the difference with red- and blue-team exercises.
DIVERSITY IN INFOSEC: A Deeper Look
WATCH NOW -- What to Tell Young People of Color About InfoSec Careers
: Juliet Okafor, CEO and founder of Revolution Cyber, and Paul Brager, director of global OT security programs at Baker Hughes, talk about the unique lessons and hard truths they provide when mentoring young, black cybersecurity professionals.
WATCH NOW -- Developing Community for Woman Infosec Pros in India
: Vandana Verma tells us how women in India are finding support, education, and love of cybersecurity through the growing InfosecGirls community.
WATCH NOW -- Supporting Women in InfoSec
: Maxine Holt, research director at Omdia, explains why the time is right for women to step into more cybersecurity jobs now. (For more, read
Maxine Holts piece on Dark Reading
.)
DAY 2: Thursday, August 6
WATCH NOW -- A Real-World Tool for Organizing, Integrating Your Other Tools
: Omdia Cybersecurity Accelerator analyst Eric Parizo describes the value overwhelmed security managers may find in a security product integration framework (SPIF).
WATCH NOW  -- Counting for Good: Hardware Counters Un-mask Malware
: Nick Gregory, research scientist at Capsule8, talks about his session with Capsule8 data scientist Harini Kannan, Uncommon Sense: Detecting Exploits With Novel Hardware Performance Counters and Machine Learning Magic.
WATCH NOW -- (Sponsored) Platform Security: Intel Pushes to Reduce Supply Chain Attacks
:
Attacks on supply chains involve lots of players and companies, not to mention an exponential amount of data for the stealing, notes Intels Tom Garrison. Notoriously difficult to detect and mitigate, Garrison discusses new approaches to securing an individual companys computing platforms, including Compute Lifecycle Assurance.
 INDUSTRIAL CONTROL SYSTEMS SECURITY: A Deeper Look
WATCH NOW -- Remotely Hacking Operations Technology Systems
: Marco Balduzzi, senior research scientist at Trend Micro, tells us how the often-overlooked ICS protocol gateways contain serious vulnerabilities that allow attackers to hack OT systems remotely
.
(For more,
see Kelly Jackson Higgins piece on Dark Reading
.)
WATCH NOW -- The Long Shadow of Stuxnet: New Microsoft Print Spooler Vulns Revealed

SafeBreach researchers Peleg Hader and Tomer Bar detail the three vulnerabilities they found in Windows Print Spoolerthat could allow an attacker to sneak into the network throughan old printer service mechanism. 
WATCH NOW -- (Sponsored) Broadcom: Staying Safe with WastedLocker Ransomware Variant on the Prowl
:
Stealthier and more patient than some predecessors, WastedLocker lingers surreptitiously for as long as it needs to for maximum payoff, says Jon DiMaggio with Broadcoms Symantec division. He explains how Windows servers are at a different risk level than their open-source counterparts, and how WastedLocker identifies valuable targets.
IOT SECURITY: A Deeper Look
WATCH NOW -- Using IoT Botnets to Manipulate the Energy Market
: Georgia Tech PhD candidateTohid Shekari talks about the session he and Georgia Tech professor Raheem Beyah gave about a stealthy and adaptable way to use IoT botnets for financial gain or market downfall.
WATCH NOW -- Why Satellite Communication Eavesdropping Will Remain A Problem
: Oxford PhD candidate James Pavur shows that SATCOM security has still made no progress since previous Black Hat disclosures, and discusses the physical and economic limitations that make it unlikely to improve anytime soon.
WATCH NOW -- (Sponsored) OpenText Blends Security, Data Protection for Greater Cyber Resilience
:
Infosec professionals are taking advantage of technology hybrids to keep users, data, and their networks more safe, according to Hal Lonas of OpenTexts Webroot division. And theyre also finding new ways to use artificial intelligence and machine learning to improve security management and reduce risk. 
CLOUD SECURITY: A Deeper Look
WATCH NOW-- Office 365s Vast Attack Surface & All the Ways You Dont Know Youre Being Exploited Through It
: Mandiant incident response managers Josh Madeley and Doug Bienstock describe how thoroughly Microsoft 365 (formerly known as Office 365) extends into corporate networks, describe both sophisticated and simple attacks theyve detected, and suggest mitigations as businesses rely more heavily on the cloud. (For more,
see Kelly Sheridans piece on Dark Reading
.)
WATCH NOW -- Exploiting Google Cloud Platform
: Security engineer Dylan Ayrey and Cruise senior infrastructure security engineer Allison Donovan describe fundamental weaknesses in GCP identity management that enable privilege escalation and lateral movement.
WATCH NOW --
 
On ‘Invisible Salamanders’ and Insecure Messages
--  Cornell researcher Paul Grubbs discusses how vulnerabilities found in Facebook Messenger encryption could mean trouble for your secure messages. (For more,
see Curt Franklins piece on Dark Reading
.)
WATCH NOW -- Where Dark Reading Goes Next
: Dark Reading editor-in-chief Tim Wilson gives a complete rundown of all the Dark Reading projects you might not even know about, his insight into the future of the security industry, and how we plan to cover it.
Related Content:
How to Decipher InfoSec Job Titles Mysteries
Block/Allow: The Changing Face of Hacker Linguistics
The Threat from the Internet—and What Your Organization Can Do About It
Special Report: Computings New Normal, a Dark Reading Perspective
 
 
 
Register now for this years fully virtual Black Hat USA, scheduled to take place August 1–6, and get more information about the event on the Black Hat website. Click for details on
conference information
 and
to register
.

Last News

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security

▸ Website hacks happened during World Cup final. ◂
Discovered: 23/12/2024
Category: security

▸ Criminal Possession of Government-Grade Stealth Malware ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Dark Reading Video News Desk Returns to Black Hat