Security News & Reviews - Page 2

More Security News

IBM Smart City Black Hat demonstration

Researchers Reveal Smart City System Flaws at Black Hat VIDEO

VIDEO: Researchers from IBM and Threatcare uncover 17 vulnerabilities across four different types of smart city technologies.
Black Hat 2018 Keynote

Google Exec Says It's Time to Stop Playing Whack-a-Mole with Security

BLACK HAT USA: Parisa Tabriz, director of engineering at Google doesn't want organizations to just focus on fixing bugs, she says they should look at root causes.
Airline Laptop Ban

Black Hat Talk Reveals How Embedded Systems Expose Airlines to Risk

Security firm IOActive is set to disclose multiple vulnerabilities in the embedded systems used for satellite communications and in-flight WiFi, revealing the larger challenge of supply chain risk.
 IBM Black Hat Deeplocker

IBM Demonstrates DeepLocker AI Malware at Black Hat

IBM researchers have developed a new proof of concept malware that can be highly targeted and very difficult to detect.
cloud security

Google Releases Details on New Shielded VMs Cloud Security Tools

The goal of the Shielded VMs technology is to help enterprises protect their workloads from hardware and firmware level cyber-threats, Google executives say.
Jask Chiron Black Hat

Jask's Chiron Brings AI Threat Detection to Home Networks

At Black Hat USA 2018, security researchers from Jask are set to demonstrate an all-in-one virtual machine for machine learning powered threat detection

Confluent Streaming Data: Product Overview and Analysis

By using a fully-managed Confluent streaming data service on Google Cloud, users can offload the operating burden of Apache Kafka and stream data at scale in real time to Google Cloud’s big data services, which including BigQuery, Cloud Machine Learning Engine and TensorFlow.
Daily Tech Briefing Aug. 7, 2018

Tech Support Scammers Taking Advantage of Call Optimization Services VIDEO

DAILY VIDEO: Symantec warns of increasingly sophisticated tech support scams, and Google is warning enterprises of potential attacks on G Suite accounts.
IOActive Trading Apps Black Hat 1088x725

IOActive to Detail Stock Trading App Vulnerabilities at Black Hat

IOActive looked at both desktop and mobile stock trading applications and found security to be lacking.

How to Secure an IoT System in a Mere Few Minutes

By 2020, IoT devices are expected to grow to 31 billion in use globally, and by 2025, the number will surpass 75.4 billion devices. That’s a lot of potential attack surfaces. Everything has to be protected.

Okta Identity Management: Product Overview and Analysis

Okta enables organizations to both secure and manage their extended enterprise and transform their customers’ experiences.
DFLabs Black Hat

DFLabs to Release Free Live Forensics Tool at Black Hat

At Black Hat USA, DFLabs will demonstrate a new free tool to help incident responders collect live forensic data.

Enterprise Tech Videos