UPDATED 08:30 EDT / JULY 26 2013

Black Hat USA 2013 Preview Round-Up

Starting this Saturday, Black Hat USA 2013 will be convening at Caesar’s Palace in Las Vegas. Over the last week, SiliconANGLE has been previewing just a handful of the sessions meant to deal with issues pertaining to Big Data and data storage and management. Here we provide a recap of just some of the week’s offerings:

Big Data And A Black Hat

With the wide adoption of OLAP, a substantial portion of the presentation will be spent going into detail on each of the individual components associated with this technology, most especially the MDX request language.

Endgame Gets Piggish With Malware Data Samples At Black Hat

While malware is regarded as a nuisance for both security providers and users alike, the presentation will highlight the opportunities presented by this incoming data, especially as it applies to machine learning. They will show how Endgame has performed static analysis on malware so they might extract specific feature sets used for performing large-scale machine learning.

Security Vulnerabilities In e-Commerce

Of course it is well known, from a data science perspective, the use of analytics presents significant advantages for an organization. What is less understood and less documented is how an organization can utilize analytics to their advantage in the area of web application security.

Black Clouds On The Computing Horizon

For Black Hat USA, Williams plans to demonstrate DropSmack v2, showing not only how it operates but also explaining how to deploy it within your own operational environment. As DropSmack is intended to point out vulnerabilities, Williams will also discuss some of the countermeasures that can be employed to mitigate attacks…

The Rise Of The Machines: It’s Not All Bad

As the technology currently allows, there is a reliance on top security practitioners to stand, seemingly with their fingers in the dyke, against an ever increasing flood of data. Even with the advances in malware and targeted attacks detection technologies, Pinto claims, “[They] can only do so much in a 24-hour day; even less if you let them eat and sleep.”

Vulnerability Statistics Suck

To say Christey and Martin are unimpressed with such statistical analysis would be an understatement. They even go so far as to call them, “…faulty or just pure hogwash.” They attribute this to the use of data that, while easily available, is drastically misunderstood. From this footing, firms then go on, “…to craft irrelevant questions based on wild assumptions.”

SiliconANGLEs theCUBE will be broadcasting live from Black Hat USA 2013 next week. I urge you to join us to learn about the cutting edge of combating data and network vulnerabilities at siliconangle.tv


A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU