Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Black Hat Set to Expose More Than 30 Zero-Day Flaws

    Written by

    Sean Michael Kerner
    Published July 16, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Over the years, the Black Hat USA security conference has built a reputation around being the place where new security vulnerabilities are disclosed, and 2015 will be no exception. Defensive approaches to security will also be a key theme at the upcoming Black Hat USA 2015 briefings event, which starts Aug. 4.

      Steve Wylie, general manager of the Black Hat conference, explained that content for the Black Hat USA event is selected by an independent review board of industry experts. “Our content comes from the community,” Wylie told eWEEK.

      For the 2015 event, Wylie said that he has seen an uptick in the submission and selection of topics that deal with malware defense as well as mobile technologies. True to its historical form though, zero-day vulnerabilities will also be a key theme at Black Hat USA 2015, Wylie noted.

      “We have 32 different zero-day vulnerabilities that will be disclosed at the event,” Wylie said. “The zero-days come from a broad swath of topics, including mobile and SCADA [supervisory control and data acquisition] systems.”

      In preparation for the event, the Black Hat conference organizers conducted an attendee survey to gauge the perception and the reality of the current security landscape. The study, based on responses from 460 IT management and security professionals, pointed to the difference in priorities over what is really important in security.

      “There is a gap between priorities and where enterprises are spending time and resources,” Wylie said.

      More than half (57 percent) of survey respondents indicated that sophisticated attacks ranked as the top concern. Yet when asked about how time and resources are spent, 35 percent of respondents indicated that dealing with security vulnerabilities introduced by their organizations’ own application development teams, consumed the most time on an average day. In contrast, looking at sophisticated attacks only consumed 20 percent of respondents’ time on an average day.


      There is also a gap when it comes to social engineering-based threats, which 46 percent of respondents cited as a key concern. Yet when it comes to time spent, it represented 31 percent.

      The media is also playing a role in fueling the gap between security perceptions and reality. The study found that 41 percent of respondents hold the opinion that media coverage on domestic surveillance concerns has been overplayed, while 27 percent thought there was too much media emphasis on hacktivists and politically motivated security incidents.

      Another key trend that the study identified is the IT security skills gap in the enterprise. Only 36 percent of respondents indicated their companies have all the job skills they require, while 55 percent admitted that additional training would be helpful. On a positive note, only 9 percent indicated that they are not prepared to deal with potential future exploits.

      The Black Hat research comes as increasing numbers of organizations are now admitting they have been the victim of a breach.

      A QuinStreet Enterprise study released on April 30 found that 76 percent of surveyed organizations had experienced a damaging breach within the past 12 months.
      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×