home.social

#bhusa — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #bhusa, aggregated by home.social.

  1. Our August Newsletter 🗞️ is now live featuring #CyberCanon Hall of Fame winners, candidates, and cyber author-focused recaps from #BlackHat and #defcon.

    Definitely worth taking a peek 👉 tinyurl.com/canon-aug25-nl

    #CyberSecurityBooks #CyberCanonHoF #HackerSummerCamp #BHUSA

  2. 🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!

    We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

    🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

    We're thrilled to share this critical Brand Story conversation thanks to our friends at ReversingLabs 🙏

    Your Business Apps Are Bringing Friends You Didn't Invite

    Every commercial software application is a complex assembly of first-party, contracted, open source, and third-party code. But when #SolarWinds, #Kaseya, and #Ivanti happened, we learned that vendor questionnaires and contractual assurances offer little protection against supply chain compromises.

    At #BlackHat2025, Saša Zdjelar, Chief Trust Officer at ReversingLabs, reveals how organizations can finally verify the integrity of #software from outside vendors—without relying on blind trust.

    The game-changer: Comprehensive binary analysis that deconstructs any file into its components to:

    • Detect malware, tampering, and embedded secrets

    • Identify #vulnerabilities and insecure practices

    • Uncover undocumented network connections

    • Flag #compliance risks from restricted regions

    This isn't just another policy checkbox—it's a true technical control that inspects the software itself, regardless of size or complexity.

    Real-world applications:

    • Procurement: Auto-scan all software before deployment

    • Version Monitoring: Detect unexpected behavior changes between releases

    • Critical Environments: Verify integrity before software enters OT, ICS, or financial systems

    • Risk Management: Assess COTS software as part of ongoing vendor reviews

    With regulations like EO 14028 and the EU's #CyberResilience Act demanding transparency, the ability to technically validate every application delivers both strategic protection and measurable benefits.

    📺 Watch the video: youtu.be/pU9bHYFND7c

    🎧 Listen to the podcast: brand-stories-podcast.simpleca

    📖 Read the blog: itspmagazine.com/their-stories

    ➤ Learn more about ReversingLabs: itspm.ag/reversinglabs-v57b

    ✦ Catch more stories from #ReversingLabs: itspmagazine.com/directory/rev

    🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25

    #Cybersecurity #SupplyChainSecurity #SoftwareIntegrity #BlackHatUSA #BHUSA25 #ThirdPartyRisk #SBOM #BinaryAnalysis #Compliance #ZeroTrust

  3. 🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!

    We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

    🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

    We're excited to share this transformative Brand Story conversation thanks to our friends at Crogl, Inc. 🙏

    How #AI Can Help Eliminate Alert Fatigue in #Cybersecurity

    Security teams drowning in alerts finally have a lifeline that doesn't compromise their data sovereignty. At #BlackHatUSA 2025, #Crogl CEO monzy merza revealed how they're solving one of cybersecurity's most persistent challenges.

    The harsh reality: Analysts routinely close hundreds of alerts with a single click—not from laziness, but from sheer necessity. As Merza notes, "When you look at the history of #breaches, the signal was there. And somebody ignored it."

    Traditional approaches fail because they expect analysts to become "unicorns"—experts in multiple platforms while remembering complex query languages. Crogl's solution fundamentally reimagines this relationship between human intuition and #machineautomation.

    Key innovations:
    • Semantic knowledge graphs that map relationships across your entire security ecosystem
    • Automated investigations using established kill chain methodologies
    • Natural language processing that converts descriptions into executable security processes
    • Privacy-first architecture that runs air-gapped with no internet dependencies • Response times reduced from weeks to minutes for complex threat hunting

    The result?
    #Analysts focus on strategic #threathunting while AI handles routine investigations—all without moving, duplicating, or exposing your data.

    📺 Watch the video: youtu.be/0GqPtPXD2ik

    🎧 Listen to the podcast: brand-stories-podcast.simpleca

    📖 Read the blog: itspmagazine.com/their-stories

    ➤ Learn more about Crogl: itspm.ag/crogl-103909
    ✦ Catch more stories from Crogl: itspmagazine.com/directory/cro

    🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25

    #Cybersecurity #AIinSecurity #AlertFatigue #ThreatHunting #BlackHatUSA #BHUSA25 #SecurityAutomation #DataPrivacy #SOC #SecurityAnalytics

  4. 🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!

    We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

    🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

    We're excited to share this transformative Brand Story conversation thanks to our friends at Crogl, Inc. 🙏

    How #AI Can Help Eliminate Alert Fatigue in #Cybersecurity

    Security teams drowning in alerts finally have a lifeline that doesn't compromise their data sovereignty. At #BlackHatUSA 2025, #Crogl CEO monzy merza revealed how they're solving one of cybersecurity's most persistent challenges.

    The harsh reality: Analysts routinely close hundreds of alerts with a single click—not from laziness, but from sheer necessity. As Merza notes, "When you look at the history of #breaches, the signal was there. And somebody ignored it."

    Traditional approaches fail because they expect analysts to become "unicorns"—experts in multiple platforms while remembering complex query languages. Crogl's solution fundamentally reimagines this relationship between human intuition and #machineautomation.

    Key innovations:
    • Semantic knowledge graphs that map relationships across your entire security ecosystem
    • Automated investigations using established kill chain methodologies
    • Natural language processing that converts descriptions into executable security processes
    • Privacy-first architecture that runs air-gapped with no internet dependencies • Response times reduced from weeks to minutes for complex threat hunting

    The result?
    #Analysts focus on strategic #threathunting while AI handles routine investigations—all without moving, duplicating, or exposing your data.

    📺 Watch the video: youtu.be/0GqPtPXD2ik

    🎧 Listen to the podcast: brand-stories-podcast.simpleca

    📖 Read the blog: itspmagazine.com/their-stories

    ➤ Learn more about Crogl: itspm.ag/crogl-103909
    ✦ Catch more stories from Crogl: itspmagazine.com/directory/cro

    🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25

    #Cybersecurity #AIinSecurity #AlertFatigue #ThreatHunting #BlackHatUSA #BHUSA25 #SecurityAutomation #DataPrivacy #SOC #SecurityAnalytics

  5. 🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!

    We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

    🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

    We're excited to share this transformative Brand Story conversation thanks to our friends at Crogl, Inc. 🙏

    How #AI Can Help Eliminate Alert Fatigue in #Cybersecurity

    Security teams drowning in alerts finally have a lifeline that doesn't compromise their data sovereignty. At #BlackHatUSA 2025, #Crogl CEO monzy merza revealed how they're solving one of cybersecurity's most persistent challenges.

    The harsh reality: Analysts routinely close hundreds of alerts with a single click—not from laziness, but from sheer necessity. As Merza notes, "When you look at the history of #breaches, the signal was there. And somebody ignored it."

    Traditional approaches fail because they expect analysts to become "unicorns"—experts in multiple platforms while remembering complex query languages. Crogl's solution fundamentally reimagines this relationship between human intuition and #machineautomation.

    Key innovations:
    • Semantic knowledge graphs that map relationships across your entire security ecosystem
    • Automated investigations using established kill chain methodologies
    • Natural language processing that converts descriptions into executable security processes
    • Privacy-first architecture that runs air-gapped with no internet dependencies • Response times reduced from weeks to minutes for complex threat hunting

    The result?
    #Analysts focus on strategic #threathunting while AI handles routine investigations—all without moving, duplicating, or exposing your data.

    📺 Watch the video: youtu.be/0GqPtPXD2ik

    🎧 Listen to the podcast: brand-stories-podcast.simpleca

    📖 Read the blog: itspmagazine.com/their-stories

    ➤ Learn more about Crogl: itspm.ag/crogl-103909
    ✦ Catch more stories from Crogl: itspmagazine.com/directory/cro

    🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25

    #Cybersecurity #AIinSecurity #AlertFatigue #ThreatHunting #BlackHatUSA #BHUSA25 #SecurityAutomation #DataPrivacy #SOC #SecurityAnalytics

  6. 🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!

    We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

    🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

    We're excited to share this transformative Brand Story conversation thanks to our friends at Crogl, Inc. 🙏

    How #AI Can Help Eliminate Alert Fatigue in #Cybersecurity

    Security teams drowning in alerts finally have a lifeline that doesn't compromise their data sovereignty. At #BlackHatUSA 2025, #Crogl CEO monzy merza revealed how they're solving one of cybersecurity's most persistent challenges.

    The harsh reality: Analysts routinely close hundreds of alerts with a single click—not from laziness, but from sheer necessity. As Merza notes, "When you look at the history of #breaches, the signal was there. And somebody ignored it."

    Traditional approaches fail because they expect analysts to become "unicorns"—experts in multiple platforms while remembering complex query languages. Crogl's solution fundamentally reimagines this relationship between human intuition and #machineautomation.

    Key innovations:
    • Semantic knowledge graphs that map relationships across your entire security ecosystem
    • Automated investigations using established kill chain methodologies
    • Natural language processing that converts descriptions into executable security processes
    • Privacy-first architecture that runs air-gapped with no internet dependencies • Response times reduced from weeks to minutes for complex threat hunting

    The result?
    #Analysts focus on strategic #threathunting while AI handles routine investigations—all without moving, duplicating, or exposing your data.

    📺 Watch the video: youtu.be/0GqPtPXD2ik

    🎧 Listen to the podcast: brand-stories-podcast.simpleca

    📖 Read the blog: itspmagazine.com/their-stories

    ➤ Learn more about Crogl: itspm.ag/crogl-103909
    ✦ Catch more stories from Crogl: itspmagazine.com/directory/cro

    🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25

    #Cybersecurity #AIinSecurity #AlertFatigue #ThreatHunting #BlackHatUSA #BHUSA25 #SecurityAutomation #DataPrivacy #SOC #SecurityAnalytics

  7. 🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!

    We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

    🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

    We're excited to share this transformative Brand Story conversation thanks to our friends at Crogl, Inc. 🙏

    How #AI Can Help Eliminate Alert Fatigue in #Cybersecurity

    Security teams drowning in alerts finally have a lifeline that doesn't compromise their data sovereignty. At #BlackHatUSA 2025, #Crogl CEO monzy merza revealed how they're solving one of cybersecurity's most persistent challenges.

    The harsh reality: Analysts routinely close hundreds of alerts with a single click—not from laziness, but from sheer necessity. As Merza notes, "When you look at the history of #breaches, the signal was there. And somebody ignored it."

    Traditional approaches fail because they expect analysts to become "unicorns"—experts in multiple platforms while remembering complex query languages. Crogl's solution fundamentally reimagines this relationship between human intuition and #machineautomation.

    Key innovations:
    • Semantic knowledge graphs that map relationships across your entire security ecosystem
    • Automated investigations using established kill chain methodologies
    • Natural language processing that converts descriptions into executable security processes
    • Privacy-first architecture that runs air-gapped with no internet dependencies • Response times reduced from weeks to minutes for complex threat hunting

    The result?
    #Analysts focus on strategic #threathunting while AI handles routine investigations—all without moving, duplicating, or exposing your data.

    📺 Watch the video: youtu.be/0GqPtPXD2ik

    🎧 Listen to the podcast: brand-stories-podcast.simpleca

    📖 Read the blog: itspmagazine.com/their-stories

    ➤ Learn more about Crogl: itspm.ag/crogl-103909
    ✦ Catch more stories from Crogl: itspmagazine.com/directory/cro

    🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25

    #Cybersecurity #AIinSecurity #AlertFatigue #ThreatHunting #BlackHatUSA #BHUSA25 #SecurityAutomation #DataPrivacy #SOC #SecurityAnalytics

  8. 🎯 NOW PUBLISHING: On-Location Coverage from #BlackHatUSA 2025!

    We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

    🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

    We're honored to share this eye-opening Brand Story conversation thanks to our friends at runZero 🙏

    The Often-Overlooked Truth in #Cybersecurity: Seeing the Unseen in Vulnerability Management

    Most successful breaches don't happen because defenders ignored known vulnerabilities. They happen because attackers exploited assets that organizations never knew existed.

    HD‏​​​​​​​​​​‏ ⁢​​​​Moore, founder and CEO of runZero and creator of #Metasploit, reveals the uncomfortable truth: organizations routinely miss half their actual attack surface. Through decades of penetration testing high-security environments, Moore discovered that traditional discovery methods only find properly managed systems while #shadowIT, legacy hardware, and misconfigured devices remain invisible.

    Key insights from our conversation:

    • When using attacker-grade discovery techniques, asset counts typically DOUBLE what organizations thought they had

    • The industry's CVE obsession creates false security while real attacks exploit misconfigurations and zero-days

    • Unknown assets—from IoT devices to forgotten servers—bypass even sophisticated security controls

    • Traditional agent-based tools can't see what attackers see

    #RunZero inverts the traditional model by starting with unauthenticated discovery that mirrors how attackers actually probe networks. This reveals the true attack surface and transforms vulnerability management from reactive patching to strategic risk reduction.

    📺 Watch the video: youtu.be/hkKJsKUugIU

    🎧 Listen to the podcast: brand-stories-podcast.simpleca 📖 Read the blog: itspmagazine.com/their-stories

    ➤ Learn more about RunZero: itspm.ag/runzero-5733

    ✦ Catch more stories from RunZero: itspmagazine.com/directory/run

    🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25

    #Cybersecurity #VulnerabilityManagement #AssetDiscovery #AttackSurface #BlackHatUSA #BHUSA25 #ShadowIT #SecurityVisibility #Metasploit #ZeroDay #tech #technology #cybersecurity

  9. 🎯 NOW PUBLISHING: On-Location Coverage from #BlackHatUSA 2025!

    We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

    🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

    We're honored to share this eye-opening Brand Story conversation thanks to our friends at runZero 🙏

    The Often-Overlooked Truth in #Cybersecurity: Seeing the Unseen in Vulnerability Management

    Most successful breaches don't happen because defenders ignored known vulnerabilities. They happen because attackers exploited assets that organizations never knew existed.

    HD‏​​​​​​​​​​‏ ⁢​​​​Moore, founder and CEO of runZero and creator of #Metasploit, reveals the uncomfortable truth: organizations routinely miss half their actual attack surface. Through decades of penetration testing high-security environments, Moore discovered that traditional discovery methods only find properly managed systems while #shadowIT, legacy hardware, and misconfigured devices remain invisible.

    Key insights from our conversation:

    • When using attacker-grade discovery techniques, asset counts typically DOUBLE what organizations thought they had

    • The industry's CVE obsession creates false security while real attacks exploit misconfigurations and zero-days

    • Unknown assets—from IoT devices to forgotten servers—bypass even sophisticated security controls

    • Traditional agent-based tools can't see what attackers see

    #RunZero inverts the traditional model by starting with unauthenticated discovery that mirrors how attackers actually probe networks. This reveals the true attack surface and transforms vulnerability management from reactive patching to strategic risk reduction.

    📺 Watch the video: youtu.be/hkKJsKUugIU

    🎧 Listen to the podcast: brand-stories-podcast.simpleca 📖 Read the blog: itspmagazine.com/their-stories

    ➤ Learn more about RunZero: itspm.ag/runzero-5733

    ✦ Catch more stories from RunZero: itspmagazine.com/directory/run

    🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25

    #Cybersecurity #VulnerabilityManagement #AssetDiscovery #AttackSurface #BlackHatUSA #BHUSA25 #ShadowIT #SecurityVisibility #Metasploit #ZeroDay #tech #technology #cybersecurity

  10. 🎯 NOW PUBLISHING: On-Location Coverage from #BlackHatUSA 2025!

    We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

    🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

    We're honored to share this eye-opening Brand Story conversation thanks to our friends at runZero 🙏

    The Often-Overlooked Truth in #Cybersecurity: Seeing the Unseen in Vulnerability Management

    Most successful breaches don't happen because defenders ignored known vulnerabilities. They happen because attackers exploited assets that organizations never knew existed.

    HD‏​​​​​​​​​​‏ ⁢​​​​Moore, founder and CEO of runZero and creator of #Metasploit, reveals the uncomfortable truth: organizations routinely miss half their actual attack surface. Through decades of penetration testing high-security environments, Moore discovered that traditional discovery methods only find properly managed systems while #shadowIT, legacy hardware, and misconfigured devices remain invisible.

    Key insights from our conversation:

    • When using attacker-grade discovery techniques, asset counts typically DOUBLE what organizations thought they had

    • The industry's CVE obsession creates false security while real attacks exploit misconfigurations and zero-days

    • Unknown assets—from IoT devices to forgotten servers—bypass even sophisticated security controls

    • Traditional agent-based tools can't see what attackers see

    #RunZero inverts the traditional model by starting with unauthenticated discovery that mirrors how attackers actually probe networks. This reveals the true attack surface and transforms vulnerability management from reactive patching to strategic risk reduction.

    📺 Watch the video: youtu.be/hkKJsKUugIU

    🎧 Listen to the podcast: brand-stories-podcast.simpleca 📖 Read the blog: itspmagazine.com/their-stories

    ➤ Learn more about RunZero: itspm.ag/runzero-5733

    ✦ Catch more stories from RunZero: itspmagazine.com/directory/run

    🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25

    #Cybersecurity #VulnerabilityManagement #AssetDiscovery #AttackSurface #BlackHatUSA #BHUSA25 #ShadowIT #SecurityVisibility #Metasploit #ZeroDay #tech #technology #cybersecurity

  11. 🎯 NOW PUBLISHING: On-Location Coverage from #BlackHatUSA 2025!

    We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

    🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

    We're honored to share this eye-opening Brand Story conversation thanks to our friends at runZero 🙏

    The Often-Overlooked Truth in #Cybersecurity: Seeing the Unseen in Vulnerability Management

    Most successful breaches don't happen because defenders ignored known vulnerabilities. They happen because attackers exploited assets that organizations never knew existed.

    HD‏​​​​​​​​​​‏ ⁢​​​​Moore, founder and CEO of runZero and creator of #Metasploit, reveals the uncomfortable truth: organizations routinely miss half their actual attack surface. Through decades of penetration testing high-security environments, Moore discovered that traditional discovery methods only find properly managed systems while #shadowIT, legacy hardware, and misconfigured devices remain invisible.

    Key insights from our conversation:

    • When using attacker-grade discovery techniques, asset counts typically DOUBLE what organizations thought they had

    • The industry's CVE obsession creates false security while real attacks exploit misconfigurations and zero-days

    • Unknown assets—from IoT devices to forgotten servers—bypass even sophisticated security controls

    • Traditional agent-based tools can't see what attackers see

    #RunZero inverts the traditional model by starting with unauthenticated discovery that mirrors how attackers actually probe networks. This reveals the true attack surface and transforms vulnerability management from reactive patching to strategic risk reduction.

    📺 Watch the video: youtu.be/hkKJsKUugIU

    🎧 Listen to the podcast: brand-stories-podcast.simpleca 📖 Read the blog: itspmagazine.com/their-stories

    ➤ Learn more about RunZero: itspm.ag/runzero-5733

    ✦ Catch more stories from RunZero: itspmagazine.com/directory/run

    🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25

    #Cybersecurity #VulnerabilityManagement #AssetDiscovery #AttackSurface #BlackHatUSA #BHUSA25 #ShadowIT #SecurityVisibility #Metasploit #ZeroDay #tech #technology #cybersecurity

  12. 🎯 NOW PUBLISHING: On-Location Coverage from #BlackHatUSA 2025!

    We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

    🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

    We're honored to share this eye-opening Brand Story conversation thanks to our friends at runZero 🙏

    The Often-Overlooked Truth in #Cybersecurity: Seeing the Unseen in Vulnerability Management

    Most successful breaches don't happen because defenders ignored known vulnerabilities. They happen because attackers exploited assets that organizations never knew existed.

    HD‏​​​​​​​​​​‏ ⁢​​​​Moore, founder and CEO of runZero and creator of #Metasploit, reveals the uncomfortable truth: organizations routinely miss half their actual attack surface. Through decades of penetration testing high-security environments, Moore discovered that traditional discovery methods only find properly managed systems while #shadowIT, legacy hardware, and misconfigured devices remain invisible.

    Key insights from our conversation:

    • When using attacker-grade discovery techniques, asset counts typically DOUBLE what organizations thought they had

    • The industry's CVE obsession creates false security while real attacks exploit misconfigurations and zero-days

    • Unknown assets—from IoT devices to forgotten servers—bypass even sophisticated security controls

    • Traditional agent-based tools can't see what attackers see

    #RunZero inverts the traditional model by starting with unauthenticated discovery that mirrors how attackers actually probe networks. This reveals the true attack surface and transforms vulnerability management from reactive patching to strategic risk reduction.

    📺 Watch the video: youtu.be/hkKJsKUugIU

    🎧 Listen to the podcast: brand-stories-podcast.simpleca 📖 Read the blog: itspmagazine.com/their-stories

    ➤ Learn more about RunZero: itspm.ag/runzero-5733

    ✦ Catch more stories from RunZero: itspmagazine.com/directory/run

    🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25

    #Cybersecurity #VulnerabilityManagement #AssetDiscovery #AttackSurface #BlackHatUSA #BHUSA25 #ShadowIT #SecurityVisibility #Metasploit #ZeroDay #tech #technology #cybersecurity

  13. 🎯 NOW PUBLISHING: On-Location Coverage from hashtag#BlackHat USA 2025!

    We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

    🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

    Next up, we're honored to share this eye-opening conversation thanks to our friends at BLACKCLOAK 🙏

    Chris and I went pretty deep in a topic that is really dear to me: the fast-growing overlap between physical and cyber threats, and why hashtag#AI is making attacks faster, more targeted, and more personal than ever. A MUST LISTEN! 🤔

    From boardroom to living room ... A compromised personal device at home can cause just as much damage as a breached server at work.

    That's why our latest episode tackles the often-missed layer of corporate security—protecting executives and their families outside the office. Chris Pierson joins Marco Ciappelli to explain how combining hashtag#technology, hashtag#privacy safeguards, and concierge-level service creates an always-on shield for high-profile leaders.

    📺 Watch the video: lnkd.in/euaGvtX2
    🎧 Listen to the podcast: lnkd.in/eJEKJuJ9
    📖 Read the blog: lnkd.in/egKFnxgy

    ➤ Learn more about #BLACKCLOAK: itspm.ag/itspbcweb
    ✦ Catch more stories from BlackCloak: lnkd.in/eG-c-b4x
    🎪 Follow all of our #BHUSA 2025 coverage: lnkd.in/gQ4-g3Ab
    #Cybersecurity #Privacy #ExecutiveProtection #DigitalSecurity #AI #BlackHatUSA #BHUSA25 #CyberThreats #PersonalSecurity hashtag#CISO #infosec#security #infosecurity #tech#genai

  14. 🎯 NOW PUBLISHING: On-Location Coverage from hashtag#BlackHat USA 2025!

    We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

    🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

    Next up, we're honored to share this eye-opening conversation thanks to our friends at BLACKCLOAK 🙏

    Chris and I went pretty deep in a topic that is really dear to me: the fast-growing overlap between physical and cyber threats, and why hashtag#AI is making attacks faster, more targeted, and more personal than ever. A MUST LISTEN! 🤔

    From boardroom to living room ... A compromised personal device at home can cause just as much damage as a breached server at work.

    That's why our latest episode tackles the often-missed layer of corporate security—protecting executives and their families outside the office. Chris Pierson joins Marco Ciappelli to explain how combining hashtag#technology, hashtag#privacy safeguards, and concierge-level service creates an always-on shield for high-profile leaders.

    📺 Watch the video: lnkd.in/euaGvtX2
    🎧 Listen to the podcast: lnkd.in/eJEKJuJ9
    📖 Read the blog: lnkd.in/egKFnxgy

    ➤ Learn more about #BLACKCLOAK: itspm.ag/itspbcweb
    ✦ Catch more stories from BlackCloak: lnkd.in/eG-c-b4x
    🎪 Follow all of our #BHUSA 2025 coverage: lnkd.in/gQ4-g3Ab
    #Cybersecurity #Privacy #ExecutiveProtection #DigitalSecurity #AI #BlackHatUSA #BHUSA25 #CyberThreats #PersonalSecurity hashtag#CISO #infosec#security #infosecurity #tech#genai

  15. 🎯 NOW PUBLISHING: On-Location Coverage from hashtag#BlackHat USA 2025!

    We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

    🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

    Next up, we're honored to share this eye-opening conversation thanks to our friends at BLACKCLOAK 🙏

    Chris and I went pretty deep in a topic that is really dear to me: the fast-growing overlap between physical and cyber threats, and why hashtag#AI is making attacks faster, more targeted, and more personal than ever. A MUST LISTEN! 🤔

    From boardroom to living room ... A compromised personal device at home can cause just as much damage as a breached server at work.

    That's why our latest episode tackles the often-missed layer of corporate security—protecting executives and their families outside the office. Chris Pierson joins Marco Ciappelli to explain how combining hashtag#technology, hashtag#privacy safeguards, and concierge-level service creates an always-on shield for high-profile leaders.

    📺 Watch the video: lnkd.in/euaGvtX2
    🎧 Listen to the podcast: lnkd.in/eJEKJuJ9
    📖 Read the blog: lnkd.in/egKFnxgy

    ➤ Learn more about #BLACKCLOAK: itspm.ag/itspbcweb
    ✦ Catch more stories from BlackCloak: lnkd.in/eG-c-b4x
    🎪 Follow all of our #BHUSA 2025 coverage: lnkd.in/gQ4-g3Ab
    #Cybersecurity #Privacy #ExecutiveProtection #DigitalSecurity #AI #BlackHatUSA #BHUSA25 #CyberThreats #PersonalSecurity hashtag#CISO #infosec#security #infosecurity #tech#genai

  16. 🎯 NOW PUBLISHING: On-Location Coverage from hashtag#BlackHat USA 2025!

    We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

    🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

    Next up, we're honored to share this eye-opening conversation thanks to our friends at BLACKCLOAK 🙏

    Chris and I went pretty deep in a topic that is really dear to me: the fast-growing overlap between physical and cyber threats, and why hashtag#AI is making attacks faster, more targeted, and more personal than ever. A MUST LISTEN! 🤔

    From boardroom to living room ... A compromised personal device at home can cause just as much damage as a breached server at work.

    That's why our latest episode tackles the often-missed layer of corporate security—protecting executives and their families outside the office. Chris Pierson joins Marco Ciappelli to explain how combining hashtag#technology, hashtag#privacy safeguards, and concierge-level service creates an always-on shield for high-profile leaders.

    📺 Watch the video: lnkd.in/euaGvtX2
    🎧 Listen to the podcast: lnkd.in/eJEKJuJ9
    📖 Read the blog: lnkd.in/egKFnxgy

    ➤ Learn more about #BLACKCLOAK: itspm.ag/itspbcweb
    ✦ Catch more stories from BlackCloak: lnkd.in/eG-c-b4x
    🎪 Follow all of our #BHUSA 2025 coverage: lnkd.in/gQ4-g3Ab
    #Cybersecurity #Privacy #ExecutiveProtection #DigitalSecurity #AI #BlackHatUSA #BHUSA25 #CyberThreats #PersonalSecurity hashtag#CISO #infosec#security #infosecurity #tech#genai

  17. 🎯 NOW PUBLISHING: On-Location Coverage from hashtag#BlackHat USA 2025!

    We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

    🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

    Next up, we're honored to share this eye-opening conversation thanks to our friends at BLACKCLOAK 🙏

    Chris and I went pretty deep in a topic that is really dear to me: the fast-growing overlap between physical and cyber threats, and why hashtag#AI is making attacks faster, more targeted, and more personal than ever. A MUST LISTEN! 🤔

    From boardroom to living room ... A compromised personal device at home can cause just as much damage as a breached server at work.

    That's why our latest episode tackles the often-missed layer of corporate security—protecting executives and their families outside the office. Chris Pierson joins Marco Ciappelli to explain how combining hashtag#technology, hashtag#privacy safeguards, and concierge-level service creates an always-on shield for high-profile leaders.

    📺 Watch the video: lnkd.in/euaGvtX2
    🎧 Listen to the podcast: lnkd.in/eJEKJuJ9
    📖 Read the blog: lnkd.in/egKFnxgy

    ➤ Learn more about #BLACKCLOAK: itspm.ag/itspbcweb
    ✦ Catch more stories from BlackCloak: lnkd.in/eG-c-b4x
    🎪 Follow all of our #BHUSA 2025 coverage: lnkd.in/gQ4-g3Ab
    #Cybersecurity #Privacy #ExecutiveProtection #DigitalSecurity #AI #BlackHatUSA #BHUSA25 #CyberThreats #PersonalSecurity hashtag#CISO #infosec#security #infosecurity #tech#genai

  18. The Pentest-Tools.com team hit ⁨Black Hat USA 2025 in Las Vegas with the same mindset we bring to our product:

    stay sharp, stay human, and *always* dig deeper.

    From inspiring keynotes (such as Mikko Hypponen's!) to hands-on chats with fellow #offensivesecurity folks, Black Hat reminded us why we love this community as much as we do!

    Behind every scan, every finding, and every report there’s a REAL person working hard to protect something they care about.

    💬 If we didn’t get the chance to meet this time, drop us a message or see you at DEF CON! 🤘

    #BHUSA #cybersecurity #infoseccommunity

  19. Here’s my latest video. 😁

    And here are the links. 😊
    Hope to see you there.
    tinyurl.com/3tk8b3rh
    #BHUSA

    tinyurl.com/y6zfn6w6
    #defcon #defcontraining

  20. Earlier this month @notbobbytables and @lavados travelled through North America giving talks at Blackhat, Intel and lately USENIX, where they were joined by fellow researchers Lukas Maar and Lukas Lamster!
    #BHUSA #usesec24 #USENIX2024

  21. Only 5 days to go until our both our Hacking Enterprises and Defending Enterprises training classes kick off at Black Hat USA.

    There's still time to snag yourself a ticket for either the weekend or weekday delivery and we'd love to help level up your skills in either offensive or defensive techniques, or both!

    Wreak havoc with in our multi-domain enterprise environment and then hunt, detect, monitor and alert after, or vice versa!

    in.security/events/

    #pentesting #redteam #hacking #training #cybersecurity #BHUSA #blueteam #kql #microsoftsentinel #threathunting

  22. Less than a month to go until Black Hat USA 👀. I suppose the only thing to say is I look forward to seeing you on either our Hacking Enterprises or Defending Enterprises trainings, or maybe both!

    ...and if I don't, I suppose the only question to ask is, why haven't your bought your ticket yet? 😎 From phishing, C2, IPv6 and rampaging through multi-domain trusts, to deep threat hunting, monitoring and alerting in our Sentinel lab - I suppose the REAL question is, how many friends or colleagues are signing up with you?!

    in.security/events/

    #pentesting #hacking #redteam #BHUSA #bluetam #threathunting #kql #microsoftsentinel