|By PR Newswire||
|July 30, 2014 07:44 PM EDT||
MENLO PARK, Calif., June 30, 2014 /PRNewswire/ -- AccessData, the leader in incident resolution technology, participates in two important sessions at Black Hat USA on August 5th – 7th in Las Vegas. The first session, "Point of Sale System Architecture and Security" features Lucas Zaichkowsky, Enterprise Defense Architect at AccessData, on Wednesday, Aug. 6th, at 2:15 pm in the South Seas Ballroom. Zaichkowsky will demonstrate how sensitive credit card data can be accessed when passed through EMV chip readers and other vulnerabilities. Amidst a backdrop of numerous major retail breaches, he will detail the common attack vectors used and the advanced attack mitigations needed to save businesses from the skyrocketing threat of cyberattacks.
Zaichkowsky will also join a lively panel sponsored by Dark Reading, "Attribution: What it Means for Enterprise Security," on the growing category of attribution services on Thursday, Aug. 7th, at 3:30 pm in the Mandalay Bay Ballroom. Today, enterprises focus very little on the attackers' profile of who they are, their motivations and attack strategies. This session will unmask these behaviors to gain better knowledge of the criminal minds and syndicates to improve enterprises' cyber defenses and response.
Registered media are invited to attend a Black Hat press conference on "Payment Systems and Point of Sale Attacks" with key experts from leading security companies including AccessData on Thursday Aug. 7th, at 1:45 pm in the Working Media Center (Lagoon F/L, floor 2). Register here by this Friday. A limited number of media passes will be available in the Media Registration and Interview Center onsite (Reef B/C, floor 2).
AccessData invites media and conference attendees to meet security experts at the company's booth #758 on August 6th – 7th. They can learn how to expand endpoint threat detection and response with the advanced ResolutionOne™ Platform. As the industry's first consolidated IR platform, ResolutionOne integrates single endpoint and threat intelligence solutions and automates processes to quickly detect, analyze and remediate incidents for faster response times.
AccessData will also join FishNet Security in sponsoring the highly popular After Party at LIGHT Nightclub, Mandalay Bay on August 6th, 7:30 – 10:30 pm. Tickets are available to conference attendees by registering here.
AccessData at Black Hat
AccessData Booth #758
August 5-7, 2014
Mandalay Bay, 3950 S Las Vegas Blvd, Las Vegas, NV
Black Hat 2014 Sessions:
- Point of Sale System Architecture and Security
- August 6, 2:15pm PT
- South Seas Ballroom, Room G/H
- Dark Reading Panel Session: Attribution: What It Means For Enterprise Security
- August 7, 3:30pm PT
- Mandalay Bay Ballroom, Room K
AccessData media interviews and sales meetings are available upon request.
AccessData Group makes the world's most advanced and intuitive incident resolution solutions. AccessData technology delivers real-time insight, analysis, response and resolution of data incidents, including cyber threats, insider threats, mobile and BYOD risk, GRC (Governance Risk & Compliance) and eDiscovery events. Over 130,000 users in corporations, law enforcement, government agencies, and law firms around the world rely on AccessData software to protect them against the risks present in today's environment of continuous compromise. http://accessdata.com.
Available and onsite at Black Hat
May. 24, 2015 07:00 PM EDT Reads: 4,458
May. 24, 2015 07:00 PM EDT Reads: 5,808
May. 24, 2015 06:00 PM EDT Reads: 5,276
May. 24, 2015 06:00 PM EDT Reads: 2,087
May. 24, 2015 05:30 PM EDT Reads: 3,850
May. 24, 2015 05:30 PM EDT Reads: 993
May. 24, 2015 05:00 PM EDT Reads: 4,062
May. 24, 2015 05:00 PM EDT Reads: 1,605
May. 24, 2015 05:00 PM EDT Reads: 1,495
In high-production environments where release cycles are measured in hours or minutes — not days or weeks — there's little room for mistakes and no room for confusion. Everyone has to understand what's happening, in real time, and have the means to do whatever is necessary to keep applications up and running optimally. DevOps is a high-stakes world, but done well, it delivers the agility and performance to significantly impact business competitiveness.
May. 24, 2015 05:00 PM EDT Reads: 1,759
May. 24, 2015 05:00 PM EDT Reads: 5,775
May. 24, 2015 05:00 PM EDT Reads: 2,141
There is no question that the cloud is where businesses want to host data. Until recently hypervisor virtualization was the most widely used method in cloud computing. Recently virtual containers have been gaining in popularity, and for good reason. In the debate between virtual machines and containers, the latter have been seen as the new kid on the block – and like other emerging technology have had some initial shortcomings. However, the container space has evolved drastically since coming on...
May. 24, 2015 04:15 PM EDT Reads: 998
The Internet of Things is not new. Historically, smart businesses have used its basic concept of leveraging data to drive better decision making and have capitalized on those insights to realize additional revenue opportunities. So, what has changed to make the Internet of Things one of the hottest topics in tech? In his session at @ThingsExpo, Chris Gray, Director, Embedded and Internet of Things, discussed the underlying factors that are driving the economics of intelligent systems. Discover ...
May. 24, 2015 04:00 PM EDT Reads: 6,319
Enterprises are fast realizing the importance of integrating SaaS/Cloud applications, API and on-premises data and processes, to unleash hidden value. This webinar explores how managers can use a Microservice-centric approach to aggressively tackle the unexpected new integration challenges posed by proliferation of cloud, mobile, social and big data projects. Industry analyst and SOA expert Jason Bloomberg will strip away the hype from microservices, and clearly identify their advantages and d...
May. 24, 2015 03:30 PM EDT Reads: 1,199