Network->General

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik Interviews Nabil Ouchn at Black Hat EU 2012

April 16, 2012

Nabil Ouchn is co-founder of NETPeas and the person behind the vastly impressive ToolsWatch. Nabil took the time to speak to us a bit about Tools Watch and their involvement in the Black Hat arsenal. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik Interviews Rafal Los at Black Hat EU 2012

April 12, 2012

We were fortunate to get an interview with HP's Global Software Security Evangelist Rafal Los at Black Hat Europe where he speaks about threat modeling and how we can stop determined attackers. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Video: FBI's Top Cyber Official Discusses Threats

March 30, 2012

"Those early attacks were much more intermittent. We are seeing literally thousands of attacks a day. The ones people hear about are often because victims are coming forward. And there are more substantial attacks that people don’t ever see or hear about..."

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik on Infosec Mistakes

March 23, 2012

We all learn from our mistakes. Tripwire compiled the 25 mistakes infosec people make and I’m adding my own. You can see great examples such as “Yes, a UFO is an unidentified flying object, but it’s probably an alien” and “Is there an award for having the most passwords?”

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

IS Controls: Protective, Detective and Recovery

March 09, 2012

To manage risks better, you often have to recommend or examine controls. The types of controls can be broken down into three types, Protective, Detective and Recovery...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

BSidesSF: AlienVault CTO Roger Thornton on Network Visibility

February 29, 2012

Roger Thornton, CTO at AlienVault, discusses the need for organizations to reduce the overall cost of network security visibility. He believes that technology is not the problem, but instead it is the time, money and staff needed for effective and meaningful visibility...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

BSidesSF: Dominique Karg on the AlienVault Open Source Model

February 28, 2012

Dominique Karg, Co-Founder and Chief Hacking Officer for AlienVault, took some time to discuss the many myths around open source architecture, the inherent benefits and problems, and why AlienVault ultimately decided to go with the open source model...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

BSidesSF: Dr. Mike Lloyd on Measuring Security Effectiveness

February 28, 2012

In his thought-provoking presentation at Security BSides SFO, Dr. Mike Lloyd - CTO at RedSeal Networks described methods for building an enterprise security metrics program that’s completely different from the current model of counting vulnerabilities or patches applied...

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Introduction to Bro Network Security Monitor

February 08, 2012

Great intro video to the Bro Security Network Analysis Framework by Richard Bejtlich. Bro is an amazing tool that gives you a summary of what is going on in your network. It creates text log files of connections, protocols, communications, and what it sees on the wire...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Video: Anonymous Claims Hack of FBI Conference Call

February 03, 2012

"The conversation covers tracking of Anonymous and other splinter groups, dates of planned arrests and details of evidence held by police. Anonymous also published an email from the FBI, showing the email addresses of call participants. The FBI confirmed the intercept..."

Comments  (0)

6d117b57d55f63febe392e40a478011f

Hacker Halted: Jeff Bardin on the Cyber Intelligence Cycle

October 30, 2011

"Criminals and nation-states have adopted traditional physical intelligence techniques for the cyber world. Jeff Bardin examines various CYBINT and OSINT methods, information mining of social networking sites and the tools in use for gathering information on targets of opportunity...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Hacker Halted Miami: Qualys CTO Wolfgang Kandek on APTs

October 25, 2011

The term, "Advanced Persistent Threats" gives the impression that most organizations are not equipped to deal with sophisticated attacks. Wolfgang Kandek's Hacker Halted keynote exposes the reality behind the causes of these threats and makes the case for a new security model...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Alexander Polyakov - CTO - ERPScan

August 18, 2011

Alexander Polyakov is the CTO at ERPScan, the OWASP-EAS manager for the OWASP-EAS, and a well-known security expert on enterprise applications such as SAP and Oracle, and who published a significant number of the vulnerabilities found in the applications of these vendors...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Nabil Ouchn - CTO at NETpeas

August 17, 2011

Nabil Ouchn is the co-founder and CTO at NETpeas and the creator of Security Tools Watch. Nabil has over 10 years of experience in IT security assessment, vulnerability management and IS risk analysis driving security pentests and ethical hacking audits...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Mark Boltz - Solutions Architect - Stonesoft

August 17, 2011

Mark Boltz is the senior solutions architect at Stonesoft, a CISSP and an innovator in business continuity and network security solutions. Mark has more than twenty years experience in information systems and network administration, with more than twelve years specialization in information security...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Chris Blask of AlienVault

August 15, 2011

Chris Blask is the VP of the Industrial Control Systems Group at AlienVault. He has been involved in the information security industry for twenty years. He also invented one of the first commercial firewall products, the BorderWare Firewall Server, and is on the faculty at IANS...

Comments  (1)


« First < Previous   | 1 - 2 - 3 |   Next > Last »