Page 15 - Cyber Defense eMagazine - August 2018
P. 15

BLACKHAT CONFERENCE 2018 TRIP REPORT



               by Gary S. Miliefsky, Publisher with  additional content provided by UBM, RSA and others…

               Every year, BlackHat continues to keep me and the growing number of attendees on our toes,
               literally.  There is so much to see and do – so much to learn, you can’t help but to leave at the
               closing wanting more.























               The event welcomed nearly 19,000 of the most security-savvy professionals across the InfoSec
               spectrum – spanning academia, world-class researchers, and leaders in the public and private
               sectors. The event’s robust lineup featured groundbreaking content led by security experts who
               showcased the latest and greatest research currently impacting the industry.


               The  Black  Hat  Review  Board,  comprised  of  24  of  the  world's  foremost  security  experts,
               evaluated more submissions this year than ever before – producing the largest program to date.
               This year's conference welcomed more than 300 speakers and Trainers across more than 80
               deeply  technical  Trainings  and  nearly  120  innovative  research-based  Briefings  on stage. For
               more  information  about  the  event  and  to  download  available  whitepapers  and
               presentations, visit: blackhat.com/us-18/.

               Interviews and cool companies I found on the show floor…


               I  ran  into  WhiteSource,  a  market  leader  in  the  open  source  security  space,  who  recently
               released  the  next  generation of Software Composition Analysis: the Effective Usage Analysis.
               This  new  technology  differentiates between  the  effective  and  ineffective  vulnerable
               functionalities and reduces open source vulnerability alerts by 70%!   Less work, anyone?

               Checked out the updates from Digital Defense and McAfee.  The integration of Digital Defense’s
               Frontline  Vulnerability  Manager™  (Frontline  VM™)  and  McAfee®  ePolicy  Orchestrator®
               (McAfee  ePO™)  provides  organizations  with  clear  visibility  into  managed  and  unmanaged
               devices.  Rapid,  automated  deployment  of  threat  detection  agents  on  unmanaged  devices
               results in bolstered security, while reducing the resources required to administer security.







                   15    Cyber Defense  eMagazine – August 2018 Edition
                         Copyright © 2018, Cyber Defense Magazine,  All rights reserved worldwide.
   10   11   12   13   14   15   16   17   18   19   20