Black Hat Asia 2024 NOC: Cisco Security Cloud

Black Hat Asia 2024 NOC: Cisco Security Cloud

Cisco is honored to be a partner of the Black Hat NOC (Network Operations Center), and this was our seventh year supporting Black Hat Asia. Cisco is the Official Mobile Device Management, Malware Analysis and DNS (Domain Name Service) Provider. We work with other official providers to bring the hardware, software and engineers to build and secure the network, for our joint customer: Black Hat. Arista: Network Equipment Corelight: Network Analytics and Detection MyRepublic: Broadband…

Read More

White House Recommends Memory-Safe Programming Languages and Security-by-Design

White House Recommends Memory-Safe Programming Languages and Security-by-Design

A new White House report focuses on securing computing at the root of cyber attacks — in this case, reducing the attack surface with memory-safe programming languages like Python, Java and C# and promoting the creation of standardized measurements for software security. The report urges tech professionals to: Implement memory-safe programming languages. Develop and support new metrics for measuring hardware security. This report, titled Back to the Building Blocks: A Path Toward Secure and Measurable…

Read More

Black Hat Europe 2023 NOC: Threat Hunting

Black Hat Europe 2023 NOC: Threat Hunting

Cisco is a longtime partner of the Black Hat NOC and 2023 was our seventh year supporting Black Hat Europe. Cisco is the Official Mobile Device Management, Malware Analysis and DNS (Domain Name Service) Provider. We work with the other official providers to bring the hardware, software and engineers to build and secure the network, for our joint customer: Black Hat. Arista: Wired and Wireless Network Equipment Corelight: Network Analytics and Detection NetWitness: Threat Detection…

Read More

Managing cyber risks while company scales

Managing cyber risks while company scales

Managing cyber risks while company scales | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Top 28 cybersecurity conferences of 2022

Top 28 cybersecurity conferences of 2022

Top 28 cybersecurity conferences of 2022 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Top 29 cybersecurity conferences of 2022

Top 29 cybersecurity conferences of 2022

Top 29 cybersecurity conferences of 2022 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More