Page 15 - Cyber Defense eMagazine - August 2018
P. 15
BLACKHAT CONFERENCE 2018 TRIP REPORT
by Gary S. Miliefsky, Publisher with additional content provided by UBM, RSA and others…
Every year, BlackHat continues to keep me and the growing number of attendees on our toes,
literally. There is so much to see and do – so much to learn, you can’t help but to leave at the
closing wanting more.
The event welcomed nearly 19,000 of the most security-savvy professionals across the InfoSec
spectrum – spanning academia, world-class researchers, and leaders in the public and private
sectors. The event’s robust lineup featured groundbreaking content led by security experts who
showcased the latest and greatest research currently impacting the industry.
The Black Hat Review Board, comprised of 24 of the world's foremost security experts,
evaluated more submissions this year than ever before – producing the largest program to date.
This year's conference welcomed more than 300 speakers and Trainers across more than 80
deeply technical Trainings and nearly 120 innovative research-based Briefings on stage. For
more information about the event and to download available whitepapers and
presentations, visit: blackhat.com/us-18/.
Interviews and cool companies I found on the show floor…
I ran into WhiteSource, a market leader in the open source security space, who recently
released the next generation of Software Composition Analysis: the Effective Usage Analysis.
This new technology differentiates between the effective and ineffective vulnerable
functionalities and reduces open source vulnerability alerts by 70%! Less work, anyone?
Checked out the updates from Digital Defense and McAfee. The integration of Digital Defense’s
Frontline Vulnerability Manager™ (Frontline VM™) and McAfee® ePolicy Orchestrator®
(McAfee ePO™) provides organizations with clear visibility into managed and unmanaged
devices. Rapid, automated deployment of threat detection agents on unmanaged devices
results in bolstered security, while reducing the resources required to administer security.
15 Cyber Defense eMagazine – August 2018 Edition
Copyright © 2018, Cyber Defense Magazine, All rights reserved worldwide.