This week in Las Vegas, hundreds of cybersecurity vendors are on hand for the Black Hat USA 2024 conference—many of them with new tools or product capabilities ready to unveil. At one of the security ...
Black Hat has always been an intriguing event to me. It takes its name from the malicious hackers who take on ethical “white hat” defenders, yet the audience is full of (figurative) white hats from ...
Red Hat introduced a series of new security capabilities this week during its annual summit to advance security across open hybrid cloud environments. The vendor announced a software supply chain ...
Who do you trust to find security issues? What kind of researcher is best at sniffing out vulnerabilities and gaps in security? Do you put your faith in the good guys working for security firms? Do ...
The real controversy, however, is the impact this could have on the safety of RFID proximity badge technology. HID claims that IOActive's presentation contained HID schematics and source code ...
In a bid to help developers securely build and deploy applications that rely on open source components, Red Hat unveiled the secure-by-design playbook the company has used for decades to build, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results