Black Hat Podcasts
Black Hat Fireside Chat: Why using ‘Clean Code’ is paramount in speedy software development
Clean Code’ is a simple concept rooted in common sense. This software writing principle cropped up some 50 years ago and might seem quaint in today’s era of speedy software development. Related: ...
Black Hat Fireside Chat: Flexxon introduces hardened SSD drives as a last line defense
Creating ever smarter security software to defend embattled company networks pretty much sums up the cybersecurity industry. Related: The security role of semiconductors Cutting against the grain, Flexxon, a Singapore-based supplier of ...
Black Hat Fireside Chat: The impactful role crowdsourced security intelligence must play
From Kickstarter to Wikipedia, crowdsourcing has become a part of everyday life. Sharing intel for a greater good Now one distinctive type of crowdsourcing — ethical hacking – is positioned to become ...
Black Hat Fireside Chat: How ‘enterprise browsers’ serve as a checkpoint to stop ChatGPT leakage
For a couple of decades now, the web browser has endured in workplace settings as the primary employee-to-Internet interface. It’s really just assumed to be a given that a browser built for ...
Black Hat Fireside Chat: How to achieve API security — as AI-boosted attacks intensify
API security has arisen as a cornerstone of securing massively interconnected cloud applications. At Black Hat USA 2023, I had a great discussion about API security with Data Theorem COO Doug Dooley ...
Black Hat Fireside Chat: Horizon3.ai makes a strong case for continuous, self-service pentesting
LAS VEGAS — Penetration testing, traditionally, gave businesses a nice, pretty picture of their network security posture — at a given point in time. Related: Going on the security offensive Such snapshots ...
Black Hat Fireside Chat: Easy come, easy go access strengthens ‘Identity Threat Detection & Response’
The rise of the remote workforce, post Covid-19, did nothing to make the already difficult task of doing Identity and Access Management (IAM) any easier for CISOs. Related: Exposing Shadow IT With ...
Black Hat Fireside Chat: Taking the fight to the adversaries — with continuous, proactive ‘pen tests’
Penetration testing – pen tests – traditionally have been something companies might do once or twice a year. Related: Cyber espionage is on the rise Bad news is always anticipated. That’s the ...
Black Hat Fireside Chat: Doing deep-dive API security — as software gets developed and deployed
APIs have come to embody the yin and yang of our digital lives. Related: Biden moves to protect water facilities Without application programming interface, all the cool digital services we take for ...
Black Hat Fireside Chat: Deploying ‘AI’ as a weapon to win the ‘attack surface management’ war
Short-handed cybersecurity teams face a daunting challenge. Related: ‘ASM’ is cybersecurity’s new centerpiece In an intensely complex, highly dynamic operating environment, they must proactively mitigate myriad vulnerabilities and at the same time ...