Apple Presentations Pulled From Black Hat - InformationWeek
IoT
IoT
Infrastructure // PC & Servers
News
8/4/2008
06:22 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Apple Presentations Pulled From Black Hat

Apple's security engineering team had been planning a presentation at the security conference, being held at Caesar's Palace in Las Vegas.

The Black Hat Conference is again Apple-free.

Apple's security engineering team had been planning a presentation at the security conference, which runs through the end of this week at Caesar's Palace in Las Vegas.

Such an event would have marked the first time Apple had made an official presentation at the conference.

But according to a conference spokesperson, one of the panelists told conference organizers that Apple's security engineering team had some problems they wouldn't be able to solve in time. So the Apple presentation is not happening.

Apple, as is its habit when questioned about security issues, did not respond to requests for comment.

But a report in Computerworld suggests that the cancellation of the talk has more to do with image management than workload management.

Dark Reading, a sister Web site to InformationWeek, quoted Black Hat Director Jeff Moss as saying that Apple pulled its session virtually at the last minute.

"Marketing got wind of it, and nobody at Apple is ever allowed to speak publicly about anything without marketing approval," Moss said in the story.

Another Apple-related event also was canceled, though technically it couldn't have been canceled because it was never officially accepted. Security researcher Charles Edge withdrew a proposed talk on an undisclosed vulnerability in Apple's FileVault file encryption software for Mac OS X.

According to a Black Hat conference spokesperson, Edge's proposed talk had not yet been accepted when it was withdrawn.

The Washington Post reported that Edge withdrew from consideration because he had signed a confidentiality agreement with Apple. It's not immediately clear whether Edge remembered his contractual obligations at the last minute or whether he had his memory jogged by a reminder from Apple about the legal consequences of a contractual breach.

Edge could not be reached for comment.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll