Black Hat USA 2022
Photos: Black Hat USA 2022, part 2
Here’s a photo gallery that provides a look inside Black Hat USA 2022. For our complete coverage of the conference, live from Las Vegas, check out our microsite. Fastly, …
Photos: Black Hat USA 2022
Here’s a photo gallery that provides a look inside Black Hat USA 2022. For our complete coverage of the conference, live from Las Vegas, check out our microsite. Bayside …
Photos: Black Hat USA 2022 Arsenal
At the Black Hat USA 2022 Arsenal by ToolsWatch, researchers showcase their latest open-source tools and products. This year, the Arsenal provides tool demonstrations in an …
Checkmarx API Security identifies shadow and zombie APIs during software development
In Las Vegas, at Black Hat USA 2022, Checkmarx has released Checkmarx API Security, the “shift-left” API security solution. Building on the launch of Checkmarx …
NetWitness Platform XDR 12 offers visibility into all key data planes across an organization
NetWitness announced at the Black Hat USA 2022 the upcoming availability of NetWitness Platform XDR 12 later this month, the extended detection and response solution. …
Code42 collaborates with Nullafi to prevent data exfiltration by high-risk and departing employees
Code42 Software collaborates with Nullafi to restrict access to regulated data – financial, healthcare, Personally Identifiable Information (PII) – or other sensitive data …
Syxsense Zero Trust enables security teams to build access policies and remediation workflows
In Las Vegas, at Black Hat USA 2022, Syxsense announced Syxsense Zero Trust, a module within Syxsense Enterprise that enables endpoint compliance with Zero Trust Network …
Concentric releases AI-based solution to protect data shared across business messaging platforms
Concentric AI has launched functionality that protects sensitive data shared as text or attachments across business messaging platforms, including e-mail, Slack and Microsoft …
Black Hat USA 2022 video walkthrough
In this Help Net Security video, we take you inside Black Hat USA 2022 at the Mandalay Bay Convention Center in Las Vegas. The video features the following vendors: Abnormal …
SquarePhish: Advanced phishing tool combines QR codes and OAuth 2.0 device code flow
In this Help Net Security video, Security Consultant Kam Talebzadeh and Senior Security Researcher Nevada Romsdahl from Secureworks, showcase SquarePhish, a tool that combines …
Pentera Credential Exposure reveals compromised identity threats to internal and external attack surface
Pentera announced Credential Exposure, a new module on the Pentera platform for testing stolen and compromised credentials against the complete enterprise attack surface. …
Open Cybersecurity Schema Framework project helps organizations detect and defend from cyberattacks
A coalition of cybersecurity and technology leaders announced an open-source effort to break down data silos that impede security teams. The Open Cybersecurity Schema …
Featured news
Sponsored
Don't miss
- Beware of phishing emails delivering backdoored Linux VMs!
- Google patches actively exploited Android vulnerability (CVE-2024-43093)
- Open-source software: A first attempt at organization after CRA
- Maximizing security visibility on a budget
- Millions of Synology NAS devices vulnerable to zero-click attacks (CVE-2024-10443)