Securing Black Hat From Black Hat

Advisories

Discover Organizations/Events News

Securing Black Hat From Black Hat

Securing Black Hat from Black Hat sounds like a great tagline, but it
Our primary objective for network security was to maintain an open environment that was both available and performed well, but equally safe and secure. The principal challenge came from the Black Hat attendees themselves, a group of men and women who were constantly testing new attack techniques and tools against the network throughout the entirety of the conference.

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.