Shows and Events
Shows and Events

Shows and Events (49)

All the fun (and not so fun) trips

Voice is an often overlooked big threat vector as phone fraud rises – part I
Published in Shows and Events
Def Con 25, Las Vegas, NV – Your phone rings and you check the number as a precaution against marketing calls and it looks like it is from your office. The voice on the other end says that there is…
Illusive Networks says that deception everywhere is the way to go
Published in Shows and Events
Black Hat 2017, Las Vegas, NV -When an attacker gains a foothold in a network the first thing they need to do is learn the lay of the land. They have done some research on the target to gather information…
CloudPassage Looks to secure your entire cloud infrastructure
Published in Shows and Events
Black Hat 2017, Las Vegas, NV -The cloud has become one of those buzz words that people like to use when they want you to put your data or workloads on someone else’s computers and network. Amazon Web Services (AWS),…
Vera jumps into the document control market with both feet
Published in Shows and Events
28 July 2017
Rate this item
(0 votes)

Vera jumps into the document control market with both feet Featured

Black Hat USA 2017 – Las Vegas, NVThree years ago we talked with a company that had something of a change in thought process on how to protect your data. Instead of building bigger walls they wanted to make the…
Attivo Networks rolls in incident response and controls into their deception
Published in Shows and Events
Black Hat USA 2017 - Las Vegas, NV.Another company that we have the chance to sit down with was Attivo Networks. Attivo, if you are not familiar with them specialize in network deception through the use of projected systems. These…
Dell talks security, document control, and air gapped networks at Black Hat 2017
Published in Shows and Events
Black Hat USA 2017 - Las Vegas, NVWhen you think of Dell you might get many different images that come to mind. For some they might think about the 90s and the “you’re getting a Dell Dude” guy. Others might…
AMD Drops the Ryzen based Threadripper CPU on Computex
Published in Shows and Events
Earlier today, we talked about Intel’s response to AMD’s Ryzen success so we thought we would give some love to AMD as well. Although we are not out at Computex (again) we are still getting news from different manufacturers. We…
Intel Launches the new X-Series at Computex 2017
Published in Shows and Events
With Computex going on there has already been lots of news hitting the street about new PC gear. Everything from GPUs, Laptops, Cases, overclocking world records, you know the stuff. We have also heard that Intel has kicked a new…
We meet Venafi's Tammy Moskites to see what has changed about trust in a year
Published in Shows and Events
Last year at Black Hat we had an interesting conversation with Tammy Moskites from Venafi. Although Tammy is both the CIO and CISO of Venafi the conversation did not focus on that company or the product as a whole. Instead…
Qualys talks to us about getting a handle on security and feature parity in the cloud
Published in Shows and Events
Black Hat 2016, Las Vegas, NVWe had the chance to sit down with Chris Carlson, vice president of product management for Qualys and talk a little about what Qualys is up to and where they are moving to in the…
Cymmetria shows us a new type of deception at DEF CON using MazeRunner
Published in Shows and Events
DEF CON 24 - Las Vegas, NVThe term Honey Pot is one that most people are very aware of. It is a form of detection that is designed to lure an attacker into targeting a simulated system so that you…
Last year at Black Hat USA 2014 we met up with a company that was looking to make some changes in the way we protect our data, Ionic Security. The concept was very simple, but the implementation was sure to…
In addition to seeing more than a few products and ideas during Black Hat and DEF CON we also had the chance to see something really cool from the team at Trustwave. This was not a product, but a chance…
The one common thing that I keep hearing everyone talk about at Black Hat and even DEF CON is how to protect your data. It is pretty much a given that if someone wants to get into your network they…
Have you ever lost your keys and had that moment of panic where you are not sure who might have them? This is not a good feeling. You do not know if someone has them and might use them to…
One of the truths in security is that while an attacker can stay hidden they can continue to operate. In short, if you do not know about something, there is nothing you can do. Now you would think that this…