BlackHat USA, an annual cybersecurity conference with global attendance since 1997, is an essential forum for sharing cutting-edge security research, trends, and networking among IT and cybersecurity professionals. From its humble origins in Las Vega...
CMP Media, a marketing solutions company serving the technology, healthcare and entertainment markets, announced today that it has acquired Black Hat Inc., a producer of information security conferences and training that includes Black Hat Briefings and Conferences.
Three of the world's biggest electronics companies--IBM, Sony and Royal Philips Electronics--have joined forces with the two largest Linux software distributors to create a company for sharing Linux patents, royalty-free.
The Open Invention Network (OIN), as the new firm unveiled on Thursday is known, could mark a breakthrough in resolving how to protect vendors and customers from patent royalty disputes resulting from freely shared Linux code.
The six-day LISA '05 training program includes 50 in-depth, immediately useful sessions on the latest techniques, effective tools, and best strategies
for solving the toughest system administration challenges. The new Hit the Ground Running Track offers 15-minute talks that give a head start on the
must-know topics in cutting-edge technologies including VoIP, SAN, configuration management, identity management, and network security.
With many keeping one eye on Hurricane Wilma churning off the coast, 6,000 IT executives last week heard Gartner analysts offer their vision on everything from security trends to wireless network directions. The Gartner Symposium and IT Expo 2005 also brought out 190 vendors and included keynote presentations from Microsoft CEO Steve Ballmer, HP CEO Mark Hurd and Dell CEO Michael Dell.
The term "Hacker" describes "one who creatively overcomes obstacles".
Today in the digital age, this term has been shrouded with mystery, confusion and misconceptions.
How can one expect to defend a stronghold, without first understanding the methods and methodologies of attack? How can one expect to design, implement and defend an architecture, without a deep understanding of a hackers' frame of mind? These are basic questions every Technical Security Designer and Coordinator should ask.
Rootkits. Zero-day exploits. Social engineering. Encryption cracking. Cryptography. File format fuzzing. Kernel exploitation. These are just some of the buzzwords making the rounds at the Black Hat USA 2005 security conference here, where some of the sharpest minds in the research community will congregate to share information on computer and Internet security threats.
A fledgling nonprofit group working to develop an automated cyber-attack early warning system, the Cyber Incident Detection Data Analysis Center (CIDDAC), is about to begin a pilot project to collect data on network intrusions from a group of companies in national-infrastructure industries.
We are proud to announce the immediate availability of the Hack In The Box Security Conference 2004 videos [Pack-1 and Pack-2]. Held at The Westin Kuala Lumpur in Malaysia from October 4th till the 7th, HITBSecConf2004 saw some of the biggest names in the network security industry down to present their latest research and findings. HITBSecConf2004 was also the first time we had two keynote speakers namely Theo de Raadt, creator and project leader for OpenBSD and OpenSSH and John T. Draper infamously known as Captain Crunch. Other speakers who presented include the grugq, Shreeraj Shah, Fyodor Yarochkin, Emmanuel Gadaix, Adam Gowdiak, Jose Nazario, Meder Kydyraliev and several others.
A joint system for reporting and grading security vulnerabilities is going to be launched today. With an eye to guiding companies on which software problems to patch first, Cisco, Symantec and Qualys plan to launch a joint grading system for security vulnerabilities. The ratings will consist of three numbers, Gerhard Eschelbeck, the chief technology officer at security information provider Qualys said on Tuesday. The first will be a baseline estimate of the severity of the flaw. The second will rate the bug depending on how long it has been around, and therefore how likely it is that companies have patched against it.
Organisers of LCA 2005, the International Linux conference due to be held in Canberra this April, are hoping its security mini-conference will expand into a separate conference by next year.
On Tuesday, February 8th 2005, LinuxSecurity.com hosted an online chat with the well-known author, consultant, and Linux security expert Bob Toxen. Topics discussed include Linux security best practices, the 7 deadly sins of Linux security, favorite security tools, penetration testing, forensic investigations, merits of open source, full-disclosure, and log evaluation. Once again, we at LinuxSecurity.com want to thank Bob for his participation.
The Southern California Linux expo has announced that Sophos has signed on as one of the latest sponsors of SCALE 3x, the Third Annual Southern California Linux Expo. SCALE 3x has been called " .. one of the few good grass-root level technical conferences for Linux" by Linux Kernel Developer Robert Love.
The General Public License hasn't had a proper update for 13 years, and it's starting to show its age. It looks set to be updated though, to ensure it's more in tune with today's software models and potential legal battles.
"There is no single solution to the complex issues of security compliance under the HIPAA regulations," noted Dr. Braithwaite. "But there are certain best practices that every organization should follow. Employing encryption technologies in situations where the risk of a security breach is significant is an important core component of these solutions."
To celebrate the launch of the new LinuxSecurity.com, we hosted a community chat event. It was held yesterday (December 1st 2004) at 4:00pm, and featured several prominent visionaries from the open source community including Jay Beale, Brian Hatch, Paul Vixie, Lance Spitzner, and Dave Wreski. The topics discussed ranged from authentication, patch management, honeypots, virtues of open source, SELinux, as well as others. We are planning another event to held in January; please send us your ideas!
Security companies TruSecure and Betrusted are expected to formally announce on Tuesday that they plan to merge and create a newly formed company called Cybertrust. . . .
More than five million security alerts were recorded during 16 days of Olympic competition, according to Atos Origin, the company managing the Games' IT.< . . .
Embedded systems designers attending next week's Embedded Systems Conference, Boston, can see Trusted Computing components and applications in action and learn how to design in security based on Trusted Computing specifications. . . .
Sendmail has taken a first stab at software to authenticate the source of e-mail messages, a technology that will be key to preventing the proliferation of spam. The company released a module for its Sendmail e-mail server software that attempts to verify the source of messages to help Internet users block mail from unwanted senders. . . .