Feeds

CMP Media dons Black Hat

Spurs debate on future of security show

Internet Security Threat Report 2014

Tradeshow and publishing firm CMP Media has acquired Black Hat, the company behind the incisive Black Hat briefings and conferences, in a deal valued at around $10m.

Black Hat's flagship conference, Black Hat USA, has been the venue for the unveiling of hard hitting security research over many years such as a presentation on how it might be possible to run hostile code on Cisco routers at this year's show. CMP Media's annual Computer Security Institute (CSI) conference, which took place in Washington, by contrast, is a far more conservative affair.

The deal has fueled concerns that CMP might shy away from controversy and thereby "crush the life" out of Black Hat. CMP's closure of the print version of Byte magazine (which still exists as a web site) is cited by critics as a reason for concern.

That happened a long time ago in 1998 but the memory still grates for some. CMP, meanwhile, is keen to reassure the security community that it won't interfere with Black Hat's successful conference formula.

CMP has pledged to keep Black Hat and CSI as separate entities within CMP. Jeff Moss, founder and owner, will continue to run Black Hat and will join CMP Media as Director of Black Hat. Black Hat USA remains scheduled for July 2006, CMP added. ®

Beginner's guide to SSL certificates

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Shellshock over SMTP attacks mean you can now ignore your email
'But boss, the Internet Storm Centre says it's dangerous for me to reply to you'
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
China is ALREADY spying on Apple iCloud users, claims watchdog
Attack harvests users' info at iPhone 6 launch
NOT OK GOOGLE: Android images can conceal code
It's been fixed, but hordes won't have applied the upgrade
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.