The Cybersecurity and Infrastructure Security Agency (CISA) recently conducted an in-depth Red Team Assessment (RTA) to enhance cybersecurity in US critical infrastructure sectors. One critical infrastructure organization requested this ass...
As Black Hat 2019 begins, the cybersecurity topics top of mind include network security platforms, threat detection/response services, new cloud security strategies, and clarification around security analytics.
Infosec is political. It's about power — who has it, who doesn't, and how it will be used. Some geeks like to pretend otherwise, but that will be harder this year during hacker summer camp in Las Vegas, as politicians and policymakers join hackers to merge tech and policy in some much-anticipated talks.
Microsoftannounced yesterday that it has acquiredBlueTalon, a start-up whose software can prevent people from accessing certain high-value data that companies keep. Terms of the deal weren’t disclosed.
Have you heard that two years after promising to report all HTTP-based web pages as insecure, Mozilla is finally about to deliver? Soon, whenever you visit one of the shrinking number of sites that doesn’t use a security certificate, the Firefox browser will warn you.
We've had a number of articles covering the interesting news out of Intel's 2019 Open-Source Technology Summit (OSTS) held at Skamania Lodge in Stevenson, Washington. Here's a look back at the news out of the open-source event as well as some other smaller bits of information shared during the event.
Dropbox has uncovered 264 vulnerabilities, paying out US$319,300 in bounties, after a one-day bug hunt in Singapore that brought together hackers from 10 nations around the world. Hosted by bug bounty platform HackerOne, the live event saw 45 of its members from countries such as Japan, India, Australia, Hong Kong, and Sweden, and some as young as 19, galvanise in the city-state in an attempt to infiltrate Dropbox's targeted systems.
The first Open Networking Summit was held in October 2011 at Stanford University and described as “a premier event about OpenFlow and Software-Defined Networking (SDN)”. Here we are seven and half years later and I’m constantly amazed at both how far we’ve come since then, and at how quickly a traditionally slow-moving industry like telecommunications is embracing change and innovation powered by open source.
Opening the Black Hat Europe conference, founder Jeff Moss cited the 2010 attacks on Google as a point where attacks became more serious, as this enabled people in cybersecurity to “speak to a new audience.”
In case you missed it, videos for Linux Security Summit NA are now available. On Linux.com, we covered a couple of these in depth, including:
Redefining Security Technology in Zephyr and Fuchsia By Eric Brown
Europol and the European Banking Federation have launched a new campaign designed to raise public awareness of growing incidents of financial fraud and data theft, as part of European Cyber Security Month (ECMS).
The Linux Foundation’s job is to create engines of innovation and enable the gears of those engines to spin faster, said Executive Director Jim Zemlin, in opening remarks at Open Source Summit in Vancouver.
August was an exciting month for Linux and open source, with the release of Linux kernel 4.18, a new ebook offering practical advice for enterprise open source, and the formation of the Academy Software Foundation. And, to cap it off, we ended the month with a successful Open Source Summit event highlighting open source innovation at every level and featuring keynote presentations from Linus Torvalds, Van Jones, Jim Zemlin, Jennifer Cloer, and many others.
At Black Hat USA, the network operations center (NOC) and security operations center (SOC) are one in the same — reasonable for a network that exists to serve a huge gathering of security professionals. While the network that exists for a high-intensity week is unique in many ways, in others it is a concentrated example of what is possible when professionals with different areas of expertise — and different vendors — work together.
There's been a number of recent Linux/open-source conferences but more are right on the horizon, including some with video streams for those interested.
At the DefCon Voting Village in Las Vegas last year, participants proved it was child’s play to hack voting machines: As Wired reported, within two minutes, democracy-tech researcher Carsten Schürmann used a novel vulnerability to get remote access to a WinVote machine.
DEFCON has hit back at criticisms levied at it by the National Association of Secretaries of State (NASS) over the introduction of an area designed to test voting machines.
Speaking at DEFCON 26 in Las Vegas on the subject of “Securing our Nation's Election Infrastructure”, Jeanette Manfra, assistant secretary, Office of Cybersecurity and Communications from the Department of Homeland Security stressed the need for public and private sector collaboration.
Speaking at DEFCON to deliver research on “a comprehensive list of Nation-State Big Brothers,” security researcher Eduardo Lzycki said that there had been an increased number of governments both censoring and shutting down online services, as well as acquiring cyber espionage and offensive tools.
DEF CON 26 - Las Vegas - For a brief time on Friday morning, "Spot the Fed" was the easiest game to play at DEF CON. That's because the fed was standing on a stage, talking to thousands of attentive hackers and attendees here.
Despite security coming a long way from warnings of the internet being able to be taken down in fewer than 30 minutes, it has “still got a long way to go.”