Organizations/Events - Page 19

Discover Organizations/Events News

CMP Media Buys Black Hat

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

CMP Media, a marketing solutions company serving the technology, healthcare and entertainment markets, announced today that it has acquired Black Hat Inc., a producer of information security conferences and training that includes Black Hat Briefings and Conferences.

Linux backers form patent-sharing firm

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Three of the world's biggest electronics companies--IBM, Sony and Royal Philips Electronics--have joined forces with the two largest Linux software distributors to create a company for sharing Linux patents, royalty-free. The Open Invention Network (OIN), as the new firm unveiled on Thursday is known, could mark a breakthrough in resolving how to protect vendors and customers from patent royalty disputes resulting from freely shared Linux code.

Security Highlights USENIX 19th Large Installation System Administration Conference

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The six-day LISA '05 training program includes 50 in-depth, immediately useful sessions on the latest techniques, effective tools, and best strategies for solving the toughest system administration challenges. The new Hit the Ground Running Track offers 15-minute talks that give a head start on the must-know topics in cutting-edge technologies including VoIP, SAN, configuration management, identity management, and network security.

Gartner event focuses on security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With many keeping one eye on Hurricane Wilma churning off the coast, 6,000 IT executives last week heard Gartner analysts offer their vision on everything from security trends to wireless network directions. The Gartner Symposium and IT Expo 2005 also brought out 190 vendors and included keynote presentations from Microsoft CEO Steve Ballmer, HP CEO Mark Hurd and Dell CEO Michael Dell.

Hacking Defined

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The term "Hacker" describes "one who creatively overcomes obstacles". Today in the digital age, this term has been shrouded with mystery, confusion and misconceptions. How can one expect to defend a stronghold, without first understanding the methods and methodologies of attack? How can one expect to design, implement and defend an architecture, without a deep understanding of a hackers' frame of mind? These are basic questions every Technical Security Designer and Coordinator should ask.

Black Hat Confab to Spotlight Database Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Rootkits. Zero-day exploits. Social engineering. Encryption cracking. Cryptography. File format fuzzing. Kernel exploitation. These are just some of the buzzwords making the rounds at the Black Hat USA 2005 security conference here, where some of the sharpest minds in the research community will congregate to share information on computer and Internet security threats.

Cyber attack early warning center begins pilot project

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A fledgling nonprofit group working to develop an automated cyber-attack early warning system, the Cyber Incident Detection Data Analysis Center (CIDDAC), is about to begin a pilot project to collect data on network intrusions from a group of companies in national-infrastructure industries.

HITBSecConf2004: Conference Videos Released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

We are proud to announce the immediate availability of the Hack In The Box Security Conference 2004 videos [Pack-1 and Pack-2]. Held at The Westin Kuala Lumpur in Malaysia from October 4th till the 7th, HITBSecConf2004 saw some of the biggest names in the network security industry down to present their latest research and findings. HITBSecConf2004 was also the first time we had two keynote speakers namely Theo de Raadt, creator and project leader for OpenBSD and OpenSSH and John T. Draper infamously known as Captain Crunch. Other speakers who presented include the grugq, Shreeraj Shah, Fyodor Yarochkin, Emmanuel Gadaix, Adam Gowdiak, Jose Nazario, Meder Kydyraliev and several others.

Security firms show united front

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A joint system for reporting and grading security vulnerabilities is going to be launched today. With an eye to guiding companies on which software problems to patch first, Cisco, Symantec and Qualys plan to launch a joint grading system for security vulnerabilities. The ratings will consist of three numbers, Gerhard Eschelbeck, the chief technology officer at security information provider Qualys said on Tuesday. The first will be a baseline estimate of the severity of the flaw. The second will rate the bug depending on how long it has been around, and therefore how likely it is that companies have patched against it.

Chat Transcript: Real World Linux Security with Bob Toxen

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

On Tuesday, February 8th 2005, LinuxSecurity.com hosted an online chat with the well-known author, consultant, and Linux security expert Bob Toxen. Topics discussed include Linux security best practices, the 7 deadly sins of Linux security, favorite security tools, penetration testing, forensic investigations, merits of open source, full-disclosure, and log evaluation. Once again, we at LinuxSecurity.com want to thank Bob for his participation.

Sophos to Join 2005 Southern California Linux Expo

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Southern California Linux expo has announced that Sophos has signed on as one of the latest sponsors of SCALE 3x, the Third Annual Southern California Linux Expo. SCALE 3x has been called " .. one of the few good grass-root level technical conferences for Linux" by Linux Kernel Developer Robert Love.

GPL to get a makeover

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The General Public License hasn't had a proper update for 13 years, and it's starting to show its age. It looks set to be updated though, to ensure it's more in tune with today's software models and potential legal battles.

PGP Corporation Co-Sponsors HIPAA Educational Series

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"There is no single solution to the complex issues of security compliance under the HIPAA regulations," noted Dr. Braithwaite. "But there are certain best practices that every organization should follow. Employing encryption technologies in situations where the risk of a security breach is significant is an important core component of these solutions."

Transcript of Launch Chat

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

To celebrate the launch of the new LinuxSecurity.com, we hosted a community chat event. It was held yesterday (December 1st 2004) at 4:00pm, and featured several prominent visionaries from the open source community including Jay Beale, Brian Hatch, Paul Vixie, Lance Spitzner, and Dave Wreski. The topics discussed ranged from authentication, patch management, honeypots, virtues of open source, SELinux, as well as others. We are planning another event to held in January; please send us your ideas!

Sendmail searches for antispam testers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Sendmail has taken a first stab at software to authenticate the source of e-mail messages, a technology that will be key to preventing the proliferation of spam. The company released a module for its Sendmail e-mail server software that attempts to verify the source of messages to help Internet users block mail from unwanted senders. . . .