Tag Banner

All news with #conference tag

Thu, August 28, 2025

DLA Selects Google Public Sector for Cloud Modernization

☁️ Google Public Sector has been awarded a $48 million DLA Enterprise Platform contract to migrate the Defense Logistics Agency to a DoD‑accredited commercial cloud. The multi‑phased program will move key infrastructure and data to a modern, AI‑ready Google Cloud foundation and enable BigQuery, Looker, and Vertex AI analytics. Emphasizing secure‑by‑design infrastructure and Mandiant threat intelligence, the effort aims to reduce costs, improve resiliency, and accelerate AI‑driven logistics and transportation management.

read more →

Thu, August 28, 2025

Webinar: Code-to-Cloud Visibility — Foundation for AppSec

🔒 Join a focused 60-minute webinar on September 18, 2025 at 2 PM EST to learn why leading teams are prioritizing code-to-cloud visibility to reduce app risk and accelerate remediation. Experts will share practical steps to map code issues to cloud behavior, prioritize critical applications and automate fixes to shrink vulnerability counts and remediation time. Attendees receive a free ASPM checklist and a recording to apply learnings immediately.

read more →

Wed, August 27, 2025

BlueHat Asia 2025 Call for Papers Closes Sept 5 — Bengaluru

📢 BlueHat Asia 2025 in Bengaluru is now accepting talk submissions through September 5, 2025. Hosted by the Microsoft Security Response Center (MSRC), the two-day event on November 5–6 invites security researchers and responders of all experience levels to present findings, lessons learned, and industry guidance. Topics of interest include vulnerability discovery and mitigation, exploit development and detection, AI/ML security, IoT/OT and critical infrastructure protection, DFIR, social engineering, and reverse engineering. Submissions require a title and a sufficiently detailed abstract; a full academic paper is not necessary, and MSRC cases may be presented only after at least 30 days have passed since the associated fix was published. To explore co-presentation or partnership opportunities, contact bluehat@microsoft.com.

read more →

Wed, August 27, 2025

BlueHat Asia 2025 CFP Open — Submit Papers by Sep 14

📣 BlueHat Asia 2025, hosted by the Microsoft Security Response Center (MSRC), will take place in Bengaluru, India on November 5–6, 2025. The Call for Papers is open through September 14, 2025, and submissions require only a talk title and a sufficiently detailed abstract—no formal paper is necessary. Speakers are invited to present practical research and lessons across topics such as vulnerability discovery and mitigation, exploit development and detection, securing AI and machine learning, IoT/OT and critical infrastructure security, DFIR, social engineering, malware, and reverse engineering. If you’ve reported a case to MSRC, consider presenting once at least 30 days have passed since the fix was published and impacted customers were notified.

read more →

Mon, August 25, 2025

Earth Engine in BigQuery: Raster Analytics & Map Visuals

🌍 BigQuery now integrates Earth Engine, enabling analysts to run raster analytics and join satellite-derived imagery with vector data using familiar SQL workflows. Initial capabilities include the ST_RegionStats() geography function plus a curated set of ~20 Earth Engine raster datasets for land cover, weather and climate analysis. With general availability, Google Cloud adds EU regional deployment, an Image Details tab for enhanced metadata visibility, usage and quota controls, and a preview map visualization in BigQuery Studio to render GEOGRAPHY query results on Google Maps for interactive exploration and stakeholder-ready outputs.

read more →

Tue, August 19, 2025

Fortinet at Black Hat USA 2025: Innovation & Community

🔒 Fortinet played a central role at Black Hat USA 2025, engaging thousands of attendees through demos, theater sessions, and partner presentations. At Booth #2446 and the Security Fabric Theater, Fortinet highlighted integrated capabilities across secure networking, SOC transformation, endpoint protection, and CNAPP, and showcased research on adversarial AI. The program extended into DEF CON 33, reinforcing the urgency of attack surface management and rapid threat detection.

read more →

Mon, August 18, 2025

What I Wish I Knew Before Becoming a CISO — Advice

🔒 Drawing on a Black Hat panel and an eclectic career spanning Unix administration, MSSP operations, and multiple roles at Fortinet, the author distills practical guidance for aspiring and new CISOs. Key points stress that the role is not purely technical but a business resilience function demanding clear, data-driven communication, calendar discipline, and strong team building. The post also highlights burnout risks and the critical need for D&O insurance and legal preparedness.

read more →

Wed, August 13, 2025

Connect with Security Leaders at Microsoft Ignite 2025

🔒 Microsoft Security invites CISOs, SecOps leads, identity architects, and cloud security engineers to Microsoft Ignite 2025 in San Francisco (Nov 17–21) and online (Nov 18–21) to explore secure AI adoption and modern SecOps. Register with RSVP code ATXTJ77W to access the half-day Microsoft Security Forum (Nov 17), hands-on labs, live demos, and one-on-one meetings with experts. Attendees can join networking events including the Secure the Night party, pursue onsite Microsoft Security certifications, and engage in roundtables focused on threat intelligence, regulatory insights, and protecting data, identities, and infrastructure.

read more →

Thu, August 7, 2025

Black Hat USA 2025: Culture, AI, and Cyber Risk Debates

📣 At Black Hat USA 2025, founder Jeff Moss and veteran researcher Mikko Hypponen framed the conference around the interplay of technology, corporate culture, and measurable cyber risk. Moss asked whether companies let technology shape culture or adapt technology to preserve values, warning that AI-driven customer service can damage brand trust when poorly implemented. Hypponen argued that security failures often reflect system gaps—malicious links should be stopped before reaching users—and cautioned that apparent success (when nothing happens) can lead to complacency and cyclical underinvestment.

read more →

Tue, August 5, 2025

Microsoft Bounty Program: $17M Distributed in 2025

🔒 The Microsoft Bounty Program distributed $17 million this year to 344 security researchers across 59 countries, marking the largest total payout in the program’s history. In partnership with the Microsoft Security Response Center (MSRC), researchers helped identify and remediate more than a thousand potential vulnerabilities across Azure, Microsoft 365, Windows, and other Microsoft products and services. The program also expanded coverage and awards for Copilot, identity and Defender scopes, Dynamics 365 & Power Platform AI categories, and refreshed Windows attack scenario incentives to prioritize high-impact research.

read more →

Mon, August 4, 2025

Zero Day Quest returns with up to $5M bounties for Cloud

🔒 Microsoft is relaunching Zero Day Quest with up to $5 million in total bounties for high-impact Cloud and AI security research. The Research Challenge runs 4 August–4 October 2025 and focuses on targeted scenarios across Azure, Copilot, Dynamics 365 and Power Platform, Identity, and M365. Eligible critical findings receive a +50% bounty multiplier, and top contributors may be invited to an exclusive live hacking event at Microsoft’s Redmond campus in Spring 2026. Participants will have access to training from the AI Red Team, MSRC, and product teams, and Microsoft will support transparent, responsible disclosure.

read more →

Tue, July 15, 2025

Securing Cloud Identity Infrastructure Through Collaboration

🔒 CISA's Joint Cyber Defense Collaborative (JCDC) is coordinating with major cloud providers and federal partners to strengthen core cloud identity and authentication systems against sophisticated, nation-state affiliated threats. Recent incidents have exposed risks from token forgery, compromised signing keys, stolen credentials, and gaps in secrets management, logging, and governance. On June 25, a technical exchange convened experts from industry and government to share best practices and explore mitigations such as stateful token validation, token binding, improved secrets rotation and storage, hardware security modules, and enhanced logging to better detect and respond to malicious activity.

read more →

Tue, July 15, 2025

A Summer of Security: Empowering Defenders with AI

🛡️ Google outlines summer cybersecurity advances that combine agentic AI, platform improvements, and public-private partnerships to strengthen defenders. Big Sleep—an agent from DeepMind and Project Zero—has discovered multiple real-world vulnerabilities, most recently an SQLite flaw (CVE-2025-6965) informed by Google Threat Intelligence, helping prevent imminent exploitation. The company emphasizes safe deployment, human oversight, and standard disclosure while extending tools like Timesketch (now augmented with Sec‑Gemini agents) and showcasing internal systems such as FACADE at Black Hat and DEF CON collaborations.

read more →

Tue, April 1, 2025

CISA Marks Emergency Communications Month 2025: Resilience

📣 The Cybersecurity and Infrastructure Security Agency (CISA) proclaims April 2025 as Emergency Communications Month to honor emergency responders and promote secure, interoperable communications. The campaign centers on being “Resilient Together” and urges critical infrastructure organizations to enroll in free priority services such as GETS and WPS to preserve connectivity during outages caused by weather, cyber incidents, or human error. CISA emphasizes strategic partnerships across federal, state, local, tribal, and territorial stakeholders to protect the emergency communications ecosystem and strengthen community preparedness.

read more →

Mon, March 31, 2025

SAFECOM Fall 2024 Bi-Annual Meeting Executive Summary

📢 SAFECOM convened its Fall 2024 Bi‑Annual Meeting on November 19–20, 2024, in Cape Coral, Florida, bringing members and invited guests together for plenary and breakout sessions. Highlights included presentation of the Marilyn J. Praisner Leadership Award to Mr. Michael Murphy, an interactive exercise on Primary, Alternate, Contingency, and Emergency (PACE) plans, and briefings on Hurricane Helene response and federal grant navigation. Technical and policy discussions addressed mobile device "SOS only" features, FirstNet Authority initiatives, counter-jamming research, high frequency operations, and encryption use, while committees advanced governance, education, funding, and incident communications priorities.

read more →