Welcome!

News Feed Item

AccessData to Reveal Security Weaknesses in POS Architecture and Integrated Payment Processing at Black Hat USA

MENLO PARK, Calif., June 30, 2014 /PRNewswire/ -- AccessData, the leader in incident resolution technology, participates in two important sessions at Black Hat USA on August 5th – 7th in Las Vegas. The first session, "Point of Sale System Architecture and Security" features Lucas Zaichkowsky, Enterprise Defense Architect at AccessData, on Wednesday, Aug. 6th, at 2:15 pm in the South Seas Ballroom. Zaichkowsky will demonstrate how sensitive credit card data can be accessed when passed through EMV chip readers and other vulnerabilities. Amidst a backdrop of numerous major retail breaches, he will detail the common attack vectors used and the advanced attack mitigations needed to save businesses from the skyrocketing threat of cyberattacks.

Zaichkowsky will also join a lively panel sponsored by Dark Reading, "Attribution: What it Means for Enterprise Security," on the growing category of attribution services on Thursday, Aug. 7th, at 3:30 pm in the Mandalay Bay Ballroom. Today, enterprises focus very little on the attackers' profile of who they are, their motivations and attack strategies. This session will unmask these behaviors to gain better knowledge of the criminal minds and syndicates to improve enterprises' cyber defenses and response.

Registered media are invited to attend a Black Hat press conference on "Payment Systems and Point of Sale Attacks" with key experts from leading security companies including AccessData on Thursday Aug. 7th, at 1:45 pm in the Working Media Center (Lagoon F/L, floor 2). Register here by this Friday. A limited number of media passes will be available in the Media Registration and Interview Center onsite (Reef B/C, floor 2).

AccessData invites media and conference attendees to meet security experts at the company's booth #758 on August 6th – 7th. They can learn how to expand endpoint threat detection and response with the advanced ResolutionOne™ Platform. As the industry's first consolidated IR platform, ResolutionOne integrates single endpoint and threat intelligence solutions and automates processes to quickly detect, analyze and remediate incidents for faster response times.

AccessData will also join FishNet Security in sponsoring the highly popular After Party at LIGHT Nightclub, Mandalay Bay on August 6th, 7:30 – 10:30 pm. Tickets are available to conference attendees by registering here.

AccessData at Black Hat


          AccessData Booth #758


          August 5-7, 2014


          Mandalay Bay, 3950 S Las Vegas Blvd, Las Vegas, NV


          http://www.accessdata.com/blackhat

Black Hat 2014 Sessions:

 

AccessData media interviews and sales meetings are available upon request.

About AccessData

AccessData Group makes the world's most advanced and intuitive incident resolution solutions. AccessData technology delivers real-time insight, analysis, response and resolution of data incidents, including cyber threats, insider threats, mobile and BYOD risk, GRC (Governance Risk & Compliance) and eDiscovery events. Over 130,000 users in corporations, law enforcement, government agencies, and law firms around the world rely on AccessData software to protect them against the risks present in today's environment of continuous compromise. http://accessdata.com.

Media Contact:
Judy Kaneko
408-769-1673 
[email protected]

Cassie Stevenson
415-533-2720
[email protected]
Available and onsite at Black Hat

SOURCE AccessData

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of Soli...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
"Qosmos has launched L7Viewer, a network traffic analysis tool, so it analyzes all the traffic between the virtual machine and the data center and the virtual machine and the external world," stated Sebastien Synold, Product Line Manager at Qosmos, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
Financial Technology has become a topic of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 20th Cloud Expo at the Javits Center in New York, June 6-8, 2017, will find fresh new content in a new track called FinTech.
"We are a leader in the market space called network visibility solutions - it enables monitoring tools and Big Data analysis to access the data and be able to see the performance," explained Shay Morag, VP of Sales and Marketing at Niagara Networks, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
@DevOpsSummit taking place June 6-8, 2017 at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @DevOpsSummit at Cloud Expo New York Call for Papers is now open.
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
"We are a modern development application platform and we have a suite of products that allow you to application release automation, we do version control, and we do application life cycle management," explained Flint Brenton, CEO of CollabNet, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Regulatory requirements exist to promote the controlled sharing of information, while protecting the privacy and/or security of the information. Regulations for each type of information have their own set of rules, policies, and guidelines. Cloud Service Providers (CSP) are faced with increasing demand for services at decreasing prices. Demonstrating and maintaining compliance with regulations is a nontrivial task and doing so against numerous sets of regulatory requirements can be daunting task...