Come see us at Black Hat!

1067

This post was originally published here by casey pechan.

Black Hat is fast approaching and we could not be more excited! We have some great partnerships to discuss, a major overhaul of our processing grid to show off, and aĀ Halo Rover hoverboardĀ to give away.

BlackHat_2017_giveaway

Our theme is summer-movie-blockbuster Cloud At Last (likeĀ Cloud Atlas, get it)? And we canā€™t wait to show you what truly automated cloud security looks like.

Here are all the ways you can find us and take advantage ofĀ Black Hat, from July 22-27:

Visit us at booth #1853 at the Mandalay Bay Expo Hall

Stop by our Cloud At Last booth for a chance to win a Halo Rover hoverboard, or chat with us about our partnerships and the big changes weā€™ve made to our Halo platform. As you know,Ā weā€™re an approved module for Puppet, and between the two of us weā€™re making it easy to automate your compliance, and streamline and secure your workloads and containers.

We would love to stop by so we can tell you all about ourĀ new security analytics engineĀ Just last month we unveiled the CloudPassage next-generation (NG) analytics engine, which will enable you to get more meaningful information, faster, from Halo.

Catch our speaking sessions!

Be sure to check out the whiteboard sessions that will be taking place in our booth. The schedule will be displayed in our booth when the event starts. And of course, weā€™ll have experts at the booth to answer any questions you may have.

Topics include:

  • Automated workload security
  • Cloud security for containers
  • Automated compliance at DevOps speed
  • How automated security fits into DevOps toolchain
  • CloudPassageĀ Halo use-caseĀ featuring Aaron McKeown, Security Engineering & Architecture atĀ Xero

Into SITCH?

See below for information about our own strategic engineering specialist Ash Wilsonā€™s speaking session at Black Hat!

Wednesday, July 26th from 12:30 ā€“ 1:30pm

SITCH: Distributed, Coordinated GSM Counter-Surveillance

SITCH uses inexpensive hardware and open-source software to create a network of sensors for detecting malicious activity in GSM wireless networks. SITCH sensors are based on the Raspberry Pi 3 platform and use inexpensive, easy-to-source software-defined, GPS, and GSM radios. One person can manage a large number of SITCH sensors, including on-the-fly configuration and firmware updates, from a web browser.

If you havenā€™t already, donā€™t forget toĀ register for Black Hat. You wonā€™t want to miss this yearā€™s event.

Photo:www.blackhat.com

Ad

No posts to display