5 Reasons Why Developers Should Attend Security Conferences

5 Reasons Why Developers Should Attend Security Conferences

On the first night of BlackHat USA, I made conversation with a few friendly penetration testers who were perplexed when I told them I was a developer. Why would I be at a cybersecurity conference? …What was I hoping to get out of it? My general (and perhaps vague) response to them, and to others I’d meet who would be perplexed by my attendance at both BlackHat and DefCon, was that I wanted a better…

Read More

Black Hat 2024: SOC in the NOC

Black Hat 2024: SOC in the NOC

The Black Hat Network Operations Center (NOC) provides a high-security, high-availability network in one of the most demanding environments in the world: the Black Hat event. The NOC partners are selected by Black Hat, with Arista, Cisco, Corelight, Lumen, NetWitness and Palo Alto Networks delivering from Las Vegas this year. Cisco is the official Domain Name Service, Malware Analysis and Mobile Device Management provider. The Meraki team is writing a blog about the experiences in…

Read More

Cisco Innovating a New Era of Security at Black Hat 2024

Cisco Innovating a New Era of Security at Black Hat 2024

It’s almost time for another year of cutting-edge research and innovative talks, as thousands of hackers and security professionals descend upon Las Vegas for Black Hat 2024. We invite you to join us, as we celebrate a few important milestones, share the latest threat research, and educate the public with a workshop geared towards accelerating incident response. Visit Cisco at Booth #1732 At the Cisco booth, we’ll feature talks on the latest Talos research, as…

Read More

Black Hat Asia 2024 NOC: Cisco Security Cloud

Black Hat Asia 2024 NOC: Cisco Security Cloud

Cisco is honored to be a partner of the Black Hat NOC (Network Operations Center), and this was our seventh year supporting Black Hat Asia. Cisco is the Official Mobile Device Management, Malware Analysis and DNS (Domain Name Service) Provider. We work with other official providers to bring the hardware, software and engineers to build and secure the network, for our joint customer: Black Hat. Arista: Network Equipment Corelight: Network Analytics and Detection MyRepublic: Broadband…

Read More

White House Recommends Memory-Safe Programming Languages and Security-by-Design

White House Recommends Memory-Safe Programming Languages and Security-by-Design

A new White House report focuses on securing computing at the root of cyber attacks — in this case, reducing the attack surface with memory-safe programming languages like Python, Java and C# and promoting the creation of standardized measurements for software security. The report urges tech professionals to: Implement memory-safe programming languages. Develop and support new metrics for measuring hardware security. This report, titled Back to the Building Blocks: A Path Toward Secure and Measurable…

Read More

Black Hat Europe 2023 NOC: Threat Hunting

Black Hat Europe 2023 NOC: Threat Hunting

Cisco is a longtime partner of the Black Hat NOC and 2023 was our seventh year supporting Black Hat Europe. Cisco is the Official Mobile Device Management, Malware Analysis and DNS (Domain Name Service) Provider. We work with the other official providers to bring the hardware, software and engineers to build and secure the network, for our joint customer: Black Hat. Arista: Wired and Wireless Network Equipment Corelight: Network Analytics and Detection NetWitness: Threat Detection…

Read More

Managing cyber risks while company scales

Managing cyber risks while company scales

Managing cyber risks while company scales | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Top 28 cybersecurity conferences of 2022

Top 28 cybersecurity conferences of 2022

Top 28 cybersecurity conferences of 2022 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Top 29 cybersecurity conferences of 2022

Top 29 cybersecurity conferences of 2022

Top 29 cybersecurity conferences of 2022 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More