Black Hat Archives - Attivo Networks

Black Hat

Attivo Networks® Named a 2021 Top 10 Black Unicorn by Cyber Defense Magazine

Attivo Networks®, the leader in identity detection and response, today announced that Cyber Defense Magazine (CDM) has named the company a 2021 Top 10 Black Unicorn. CDM also named Carolyn Crandall, CMO and Chief Security Advocate, a winner and Sarah Ashburn, SVP of Sales and Customer Success, a finalist in the 2021 Top 10 Women in Cybersecurity.

BlackHat2019

What to See and Do at Black Hat 2019

Authored by: Carolyn Crandall, CMO & Chief Deception Officer – It’s that time of year, and Black Hat is back in town. Cybersecurity professionals (and from what I hear, clouds of grasshoppers) will soon be gathering in the Las Vegas desert.

Deception at Black Hat: Hype or Next Security Wave?

Written by: Carolyn Crandall, CMO and Chief Deception Officer – In part 1 of my Black Hat recap, I published a post highlighting some of the key themes and noteworthy topics that drove conversations at Black Hat 2018. One development that was abundantly clear, was how far deception technology adoption has progressed during the past year.

Black Hat 2018: Election Hacking, Active Defense, and More…

Written by: Carolyn Crandall, CMO and Chief Deception Officer – With another busy Black Hat now behind us, we’re catching our breath and reflecting on some of the key themes at this year’s event. Prior to the show, I put together a list of activities and events for attendees to look out for.I expected to see a lot of buzz on privacy, mobile, and device security around critical infrastructure, IoT, and payment systems. I also expected to see a slew of new innovations introduced to address the expanding attack surfaces and evolving exploits that organizations must deal with in the modern threatscape.

CRN

20 Hot Cybersecurity Products Announced At Black Hat 2018

Attivo Networks enhanced its portfolio with new deception techniques designed to derail attacks targeting nontraditional surfaces. In addition to Internet of Things and operational technology, attackers are now targeting devices and applications that can be harder to secure as organizations look for the weak link in an organization’s network.

See and Be Seen at Black Hat 2018!

Written by: Carolyn Crandall, CMO and Chief Deception Officer – Given the popularity of my last must see and do blog for RSA, I am continuing the tradition for Black Hat USA. If you are planning to attend, here are some top things to see and do.

SecurityWeek Logo

Critical Vulnerabilities Found in Nuke Plant Radiation Monitors

Critical Vulnerabilities Found in Radiation Monitors Used in Nuclear Power Plants, Seaports and Airports

LAS VEGAS – BLACK HAT USA – Researchers have discovered multiple unpatched vulnerabilities in different radiation monitoring devices that could be leveraged by attackers to reduce personnel safety, delay detection of radiation leaks, or help international smuggling of radioactive material.

In a paper (PDF) delivered by Ruben Santamarta, principal security consultant at Seattle-based IOActive, at Black Hat Wednesday, it was disclosed that radiation monitors supplied by Ludlum, Mirion and Digi contain multiple vulnerabilities.

At Black Hat Conference, good guy hackers have a bleak view of US cybersecurity

In a dark conference room lit up by large electronic screens scattered across the walls, dozens of engineers are huddled over computers, trying to safeguard their network from hackers. The room is the Black Hat Network Operations Center at the Mandalay Bay Hotel in Las Vegas, where 15,000 cybersecurity professionals from companies like FireEye and RSA are gathered for the Black Hat Conference. The room is not for show; for most of the attendees, the threat of getting hacked is real.

“In security, there’s a general belief we all have – it’s not whether or not you will be breached or attacked, it’s a matter of when,” says Haiyan Song, senior vice president and general manager at Splunk, a cybersecurity company.

Scroll to Top