Minimize your digital risk by detecting data loss, securing your online brand, and reducing your attack surface.
A powerful, easy-to-use search engine that combines structured technical data with content from the open, deep, and dark web.
Digital Risk Protection
Research Team Finds 50% Increase in Exposed Data in One Year
New report recognizes Digital Shadows for strongest current offering, strategy, and market presence of 14 vendors profiled
Read Full Report
With BSides Las Vegas, Black Hat, and DEF CON around the corner, security is likely at the forefront of many minds in the industry. Each year, headlines focus on unique presenters and the major exploits that really wow us. Understandably so.
From the hack brought to us by security researchers Runa Sandvik and Michael Auger, which caused a self-aiming rifle to miss its target and even rendered the gun completely inoperable, to the viral video of Charlie Miller and Chris Valasek remotely controlling a Jeep Cherokee—big exploits get our attention.
But what about the risks and threats faced on the floor at these conferences? BSides Las Vegas, Black Hat, and DEF CON attract people from all walks of life, to include enterprise practitioners, law enforcement, script kiddies, and traditional hacking enthusiasts. Because of this, visitors, presenters, and vendors all have the opportunity to promote new security solutions, while also learning a lot about the current threat landscape. Although, with this also comes the risk of interacting with individuals who may not have your best interests in mind.
Below are some steps you can take in order to stay safe and avoid ending up on the infamous Wall of Sheep.
By following these instructions you can decrease your vulnerability to numerous risks faced while attending security conferences. Proceed with caution, and recognize that this landscape is constantly evolving. A major takeaway from these events is that no security measure is ever one hundred percent safe.
To learn more, check out our infographic: