Tag: conference
-
Black Hat 2025: Why We Built a Museum Instead of a Booth
Tags: conferenceThink you know what to expect from a conference booth? Think again. Forget the cliches: the swag destined for the back of your wardrobe, the formula one simulators, the marketing trickery. Instead, step into a new kind of conference experience, one that takes you on a journey through past, present, and future of cybersecurity. Step…
-
Early Bird Registration Now Open for The Inaugural OpenSSL Conference 2025
Tags: conferenceNewark, United States, 4th August 2025, CyberNewsWire First seen on hackread.com Jump to article: hackread.com/early-bird-registration-now-open-for-the-inaugural-openssl-conference-2025/
-
BSidesSF 2025: Service Mesh Security: Shifting Focus To The Application Layer
Creator/Author/Presenter: Daniel Popescu Our deep appreciation to Security BSides – San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon – certainly a venue like no other; and via the organization’s YouTube channel. Additionally, the organization is welcoming…
-
BSidesSF 2025: Mapping The SaaS Attack Surface
Creator/Author/Presenter: Jaime Blasco Our deep appreciation to Security BSides – San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon – certainly a venue like no other; and via the organization’s YouTube channel. Additionally, the organization is welcoming…
-
Black Hat 2025: Latest news and insights
Tags: access, ai, api, attack, ciso, cloud, conference, crowdstrike, cvss, cyber, cybersecurity, data, defense, email, exploit, finance, firmware, flaw, group, hacker, hacking, identity, Internet, LLM, malicious, malware, reverse-engineering, sap, service, threat, tool, training, update, usa, vulnerability, windowsBlack Hat USAAugust 2-7, 2025Las Vegas, NVBlack Hat USA 2025 returns to the Mandalay Bay Convention Center in Las Vegas on August 2-7. The annual event is a perennial magnet for cybersecurity professionals, researchers, vendors and othersThe week kicks off on August 2 with four days of cybersecurity training courses. The courses cover a range…
-
ISMG Editors: ToolShell Exploit Blurs Crime and Espionage
Also: Rethinking IT-OT Integration; Previewing Black Hat 2025. In this week’s update, four ISMG editors discussed the latest on the ToolShell exploit and the rise of Warlock ransomware, why IT-OT integration may not be the best answer for industrial security and what to expect next week from ISMG Studio at Black Hat Conference 2025. First…
-
BSidesSF 2025: GenAI Application Security: Not Just Prompt Injection
Creator/Author/Presenter: Ahmed Abugharbia Our deep appreciation to Security BSides – San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon – certainly a venue like no other; and via the organization’s YouTube channel. Additionally, the organization is welcoming…
-
BSidesSF 2025: 0.0.0.0 Day: Exploiting Localhost APIs From The Browser
Creator/Author/Presenter: Gal Elbaz Our deep appreciation to Security BSides – San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon – certainly a venue like no other; and via the organization’s YouTube channel. Additionally, the organization is welcoming…
-
BSidesSF 2025: Let’s Talk About the AI Apocalypse
Creator/Author/Presenter: Dylan Ayrey Our deep appreciation to Security BSides – San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon – certainly a venue like no other; and via the organization’s YouTube channel. Additionally, the organization is welcoming…
-
The Booker Prize Longlist and Hacker Summer Camp
This week Bill connects the hype of literary awards to cybersecurity conference season. We highlight key insights from the Q2 2025 IR Trends report, including phishing trends, new ransomware strains, and top targeted sectors. Finally, check out all the places Talos will be at Black Hat. First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/the-booker-prize-longlist-and-hacker-summer-camp/
-
BSidesSF 2025: Resilience in the Uncharted AI Landscape
Creator/Author/Presenter: Ranita Bhattacharyya Our deep appreciation to Security BSides – San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon – certainly a venue like no other; and via the organization’s YouTube channel. Additionally, the organization is welcoming…
-
BSidesSF 2025: Not Every Groundbreaking Idea Needs To Become A Billion-Dollar Startup
Creator/Author/Presenter: Ross Haleliuk Our deep appreciation to Security BSides – San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon – certainly a venue like no other; and via the organization’s YouTube channel. Additionally, the organization is welcoming…
-
BSidesSF 2025: Trace to Triage: How to Connect Product Vulnerabilities to Security Paths
Creator/Author/Presenter: Ben Stav Our deep appreciation to Security BSides – San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon – certainly a venue like no other; and via the organization’s YouTube channel. Additionally, the organization is welcoming…
-
BSidesSF 2025: Compliance Without The Chaos: Building It Right Into Your DevOps Pipeline
Creator/Author/Presenter: Varun Gurnaney Our deep appreciation to Security BSides – San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon – certainly a venue like no other; and via the organization’s YouTube channel. Additionally, the organization is welcoming…
-
BSidesSF 2025: One Search To Rule Them All: Threat Modeling AI Search
Creator/Author/Presenter: Kane Narraway Our deep appreciation to Security BSides – San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon – certainly a venue like no other; and via the organization’s YouTube channel. Additionally, the organization is welcoming…
-
Minnesota governor activates National Guard after cyberattack on state capital
Mayor Melvin Carter said during a press conference on Tuesday that the city is most concerned about the data it holds on government employees, arguing that the city does not carry much information on city residents. First seen on therecord.media Jump to article: therecord.media/minnesota-governor-activates-national-guard-st-paul-cyber-attack
-
Patchwork Targets Turkish Defense Firms with Spear-Phishing Using Malicious LNK Files
The threat actor known as Patchwork has been attributed to a new spear-phishing campaign targeting Turkish defense contractors with the goal of gathering strategic intelligence.”The campaign employs a five-stage execution chain delivered via malicious LNK files disguised as conference invitations sent to targets interested in learning more about unmanned vehicle systems,” Arctic Wolf Labs said…
-
Dropping Elephant Targets Türkiye’s Missile Industry with Stealthy Conference Lures VLC DLL Sideloading
Tags: conferenceThe post Dropping Elephant Targets Türkiye’s Missile Industry with Stealthy Conference Lures VLC DLL Sideloading appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/dropping-elephant-targets-turkiyes-missile-industry-with-stealthy-conference-lures-vlc-dll-sideloading/
-
Is AI here to take or redefine your cybersecurity role?
Tags: ai, attack, automation, business, ceo, cloud, compliance, conference, control, crowdstrike, cyber, cybersecurity, data, governance, intelligence, jobs, monitoring, phishing, risk, skills, soc, software, strategy, technology, threat, training, vulnerability“AI is coming, and will take some jobs, but no need to worry.”That headline ran atop a CSO story published in 2016. Nine years later, the prediction feels closer to coming true, with questions around jobs being replaced or redefined and whether cybersecurity pros should be worried taking on greater nuance, and still hanging in…
-
TechTalk: Non-Human Identities erkennen und schützen
Die diesjährige European Identity Cloud Conference brachte uns mit Heiko Klarl zusammen, dem CEO des Sicherheitsanbieters Nexis. Was dieses Unternehmen mit dem Thema Non-Human Identities zu tun hat und wie Nexis in diesem Kontext seinen Kunden helfen kann, verrät er uns in diesem Video. First seen on ap-verlag.de Jump to article: ap-verlag.de/techtalk-non-human-identities-erkennen-und-schuetzen/97488/
-
TechTalk: Deshalb sind traditionelle PAM-Lösungen nicht mehr zeitgemäß
»Traditionelle Privileged-Access-Management-Lösungen sind nicht mehr wirklich zeitgemäß!«. Mit dieser durchaus streitbaren These stieg der Sicherheitsanbieter Silverfort auf der Cloud Identity Cloud Conference 2025 in Berlin in den TechTalk-Ring. Warum das so sei und welche passenden Antworten das Unternehmen hierauf habe, wollten wir vom Sicherheitsexperten Drew Schuil wissen. Seine Antworten lieferten die entsprechen Belege für die…
-
»manage it« TechTalk: Darum ist die identitätszentrische Sicherheit so wichtig
Guido Grillenmeier vom Sicherheitsanbieter Semperis war während der European Identity Cloud Conference 2025 unter anderem Teil einer Diskussionsrunde, in der ausgiebig über das Thema identitätszentrische Sicherheit gesprochen wurde. Welche wesentlichen Erkenntnisse sich daraus ableiten ließen und was Semperis in diesem Kontext alles unternimmt, sagt Guido in diesem gut 2 Minuten währenden Video. First seen on…
-
NSA: Volt Typhoon was ‘not successful’ at persisting in critical infrastructure
“The good news” is that China’s Volt Typhoon hacking campaign “really failed,” an NSA official said at a cyber conference in New York. An FBI official also described an incident of “true cyberwarfare” with the Flax Typhoon group. First seen on therecord.media Jump to article: therecord.media/china-typhoon-hackers-nsa-fbi-response
-
»manage it« TechTalk: So führt ein KI-Assistent namens Javi zu besseren Ergebnissen
Mit Javi hatte der Sicherheitsanbieter Omada einen KI-gestützten Assistenten in Berlin auf der European Identity Cloud Conference dabei. Was dieses Tool kann und bei welchen wesentlichen Aufgaben es eine echte Hilfe ist, darüber haben wir uns mit Thomas Müller-Martin ausgetauscht. Herausgekommen ist dieses Video mit zahlreichen nützlichen Infos zu Javi. First seen on ap-verlag.de Jump…
-
»manage it« TechTalk: Darum stehen Mobile-First-Sicherheitsstrategien zunehmend im Fokus
Die richtige Mobile-First-Sicherheitsstrategie soll helfen, iPhone, iPad und Co. resilienter und weniger angreifbar zu machen. Warum wird das immer wichtiger und worauf sollten sich Unternehmen dabei einstellen? Darüber haben wir mit Matthew Berzinski vom Sicherheitsanbieter Ping Identity auf der European Identity Cloud Conference 2025 gesprochen. Herausgekommen ist dieses Video, in dem er außerdem sagt, wie…
-
»manage it« TechTalk: Das macht eine Next-Gen PAM-Lösung anders als andere PAM-Tools
Keeper Security nennt seine PAM-Lösung KeeperPAM ziemlich selbstbewusst “The Next Generation Solution”. Warum das so ist, was sie anders macht als andere PAM-Tools und wie lange das Aufsetzen und Implementieren von KeeperPAM dauert, hat uns Martin Sawczyn auf der European Identity Cloud Conference 2025 in Berlin erzählt. First seen on ap-verlag.de Jump to article: ap-verlag.de/manage-it-techtalk-das-macht-eine-next-gen-pam-loesung-anders-als-andere-pam-tools/97234/
-
»manage it« TechTalk: Wie ein Printmagazin das digitale IAM zum Leben erweckt
Der Sicherheitsanbieter Thales leistet sich den Luxus eines IAM-fokussierten Printmagazins mit dem Namen “IAM 360”. Auf der European Identity Cloud Conference 2025 lag die Erstausgabe auf allen Tischen gut sichtbar aus. Was lag da näher, als mit Sara Sokorelis über die Idee und die Inhalte des Thales-Magazins zu sprechen. In knapp 2 Minuten haben wir…
-
»manage it« TechTalk: Darum stellen Non-Human Identities vermehrt ein Sicherheitsrisiko dar
Auf der European Identity Cloud Conference 2025 haben wir am Saviynt-Stand gleich zwei Gesprächspartner zum Videodreh getroffen, nämlich Henrique Teixeira und Jonathan Neal. Von Henrique wollten wir wissen, warum Unternehmen und Organisationen vermehrt auf Non-Human Identities achten sollten. Und von Jonathan erfuhren wir, was Saviynt zum erhöhten Schutz dieser Identitäten beiträgt. First seen on ap-verlag.de…
-
»manage it« TechTalk: Künstliche Intelligenz und IAM sind ein zunehmend gutes Gespann
Mit Gal Diskin vom Sicherheitsanbieter Delinea durften wir auf der European Identity Cloud Conference dieses Video drehen. Darin hat er uns verraten, welche KI-Trends in der Sicherheitsbranche gerade “hot” sind und wie die Künstliche Intelligenz in Delinea-Produkten zum Einsatz kommt. First seen on ap-verlag.de Jump to article: ap-verlag.de/manage-it-techtalk-kuenstliche-intelligenz-und-iam-sind-ein-zunehmend-gutes-gespann/97203/

