Organizations/Events - Page 13 - Results from #108 | LinuxSecurity.com

Organizations/Events

Discover Organizations/Events News

Black Hat USA 2015: The Hard Stuff

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Software gets much of the hacking spotlight, perhaps understandably so. But the physical infrastructure that runs all that code is just as susceptible to messing with, though it takes a different set of knowledge and techniques. Today's Training trio touch on the more solid side of that divide.

7 things to do when your business is hacked

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The first thing an IT security executive should do after the corporate network has been breached is fall back on the incident response plan that was put in place well before attackers got through the carefully constructed defenses.

Dan Kaminsky on VENOM

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Dennis Fisher talks with Dan Kaminsky about the VENOM bug, the value of virtual machine escapes, why everyone wants to make every bug the worst one of all time or just a bunch of hype and what the Avengers have to do with vulnerability disclosure.

Breaking The Security Fail Cycle

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security's heavy reliance and emphasis on technology--due to both its heritage and the reality of a shortage of manpower--is part of the reason attackers are getting the upper hand, experts said here this week.