Events | SC Media

Events

Cyber investment exec talks COVID-19, Snowden and rise of threat intel automation

The cyber threat intelligence tech space has made significant leaps in the last few years, becoming far less manual, according to Hank Thomas, CEO and co-founder of Strategic Cyber Ventures and former principal/director, cyber intelligence and security, with Booz Allen Hamilton, in an interview with SC Media. “It was seemingly like that particular sector was…

RSA 2020: Equifax CISO touts company’s transparency it as seeks breach redemption

Fresh off a financial settlement over its 2017 data breach that affected roughly half the U.S. population, Equifax is forging ahead with a $1 billion-plus investment in a new security plan — and CISO Jamil Farshchi was eager to tout the credit reporting agency’s progress so far in a session this week at the RSA…

We interviewed cyber experts on a Vegas ferris wheel. Then ride security showed up…

In the film “Ocean’s 11,” Danny Ocean and his team of expert cybercriminals execute a daring casino heist in glitzy Las Vegas. This past summer at the Black Hat and DEF CON conferences in Sin City, the editorial staff at SC Media attempted to pull off a less ambitious – and decidedly more legal –…

UK businesses far more confident re GDPR than their European counterparts

Researcher: GDPR’s Right of Access policy can be abused to steal others’ personal info

An Oxford University scholar says he was able to trick dozens of European companies into sending him sensitive data about his fiancée, simply by impersonating her while invoking GDPR’s “Right of Access” policy. Doctor of philosophy student James Pavur, who presented his research findings Thursday at the Black Hat conference in Las Vegas, exploited the policy…

Destructive malware attacks double as attackers pair ransomware with disk wipers

IBM Security’s X-Force Incident Response and Intelligence Services (IRIS) team reported this week that it witnessed a 200 percent increase in destructive malware attacks over the first half of 2019, compared to the second half of 2018. These malware attacks typically incorporated a disk wiper component to them. Wipers are historically associated with nation-state-sponsored attacks…

Selling zero-days to governments takes some business savvy, says former bug broker

Not all researchers are comfortable with the ethics of selling the zero-day vulnerabilities they’ve discovered to governments and offensive security companies. But those who do seek profit beyond that of a traditional bug bounty reward will require a fair share of business savvy to seal the deal, according to former vulnerability broker Maor Shwartz, in…

Black Hat withdraws Hurd as speaker one day after naming him keynoter

One day after announcing Rep. Will Hurd, R-Texas, as its keynoter, organizers of the 2019 Black Hat security conference promptly revoked the invitation. “Black Hat has chosen to remove U.S. Representative Will Hurd, as our 2019 Black Hat USA keynote,” conference leadership said in a statement posted on the event’s website. “We misjudged the separation of technology and politics. We…

Can event-based analytics spot IP developers stealing their own assets?

The most likely person to steal IP is not an external threat, but rather the person who developed it and uses it every day, according to Forcepoint Chief Scientist Dr. Richard Ford. And this insider threat actually may be more difficult to detect because typical event-based security analytics may not always be adequately equipped to…

Next post in Security News