Security

Richiesta di aiuto :)

Come molti di voi gia sapranno (altrimenti possono fare riferimento ad un mio post su The Puchi Herald: A.I. tech upodate) Clusit ha rilasciato la versione inglese del security report 2012 a cui ho collaborato per la sezione sulla mobile security.Anche per il 2003 Clusit tra le sue attività ha in programma di pubblicare un nuovo Security Report, in quest’ottica mi dovrei occupare ancora della sezione sulla mobile security.Al fine di rendere la sezione più aderente ai nostri interessi e rinforzare uno spirito di community vi pregherei di farmi avere idee consigli, riferimenti, materiale, statistiche che ritenete importanti ed attinenti…

Whoops! Check Point lets checkpoint.com expire

Image via CrunchBase Whoops! Check Point lets checkpoint.com expire: By Tim Greene | Network World US | 03 April 12 It’s got to be a little embarrassing for a security company steeped in paying attention to details like opening and closing firewall ports and monitoring whether applications are behaving oddly to overlook … Related articles Check Point Takes Security Products To Amazon Check Point in domain expiry snafu Check Point supports cloud security for Amazon Web Services Sentrigo Achieves OPSEC Certification From Check Point Check Point supports cloud security for Amazon Web Services How To Evaluate Next-Generation Firewalls Email cock-up…

Rapport clusit sulla sicurezza informatica in italia

È uscito il rapporto clusit sulla sicurezza informatica in italia, una finestra autorevole per conoscere lo stato della cybersecurity nel nostro paese. La documentazione si può scaricare direttamente e gratuitamente dal sito clusit 🙂 o direttamente dal link del security summit. Related articles The First Italian Cybercrime Report is Available [Infographic] (hackmageddon.com) Forensic incident response to the fore (scmagazine.com) Browse with a shared device,but watch out! (smiley2.wordpress.com) Browse with a shared device,but watch out! (securitytoolbox.wordpress.com) Spending your 2012 IT Security budget – beware of cheap, look for value (h30499.www3.hp.com) How ICT World Lived By Q1 2012 (it-sideways.com) Business insurance news:…

Ise Training day 2

Ok my turn to talk today:  We talked about one of the most interesting features of ISE, profiling. Worth to explain a little what profiling is, and what discovery and classification means. it is a very useful and powerful engine but it needs to be understood, also on what it means and why should be used. other great new, finally  ise 1.1 is available on CCO, worth the upgrade absolutely. http://www.cisco.com/en/US/docs/security/ise/1.1/release_notes/ise1.1_rn.html new stuffs: – Support for IOS Sensor for advanced features and remote profiling on the switch. – Active scan with NMAP. – A new portal guest type Device Registration…

Introduction To Network Security – Part 1

Introduction To Network Security – Part 1: Introduction By Sahir Hidayatullah – Firewall.cx Security Advisor As more and more people and businesses have begun to use computer networks and the Internet, the need for a secure computing environment has never been greater. Right now, information security professionals are in great demand and the importance of the field is growing every day. All the industry leaders have been placing their bets on security in the last few years. All IT venodors agree today that secure computing is no longer an optional component, it is something that should be integrated into every…

Forensic Software Tools

Image via Wikipedia Forensic Software Tools This post summarizes the features and advantages of a large number of software forensics tools. For detailed information and technical reports it is always best to view the vendor Web sites as well as organizations that conduct technical reviews and evaluations such as National Institute of Standards and Technology (NIST). The Computer Forensic Tools Testing project (CFTT) web site contains additional valuable information: http://www.cftt.nist.gov/disk_imaging.htm http://www.cftt.nist.gov/presentations.htm http://www.cftt.nist.gov/software_write_block.htm The information presented in this chapter is heavily based on the assertions of the various vendors who make the products listed in the chapter. Much of the information…

A.I. Talking Points–Security Week Review

Is not easy to make a summon of what happened in this crazy market every week. Not because there are not enough arguments to explore but, in effect, because there are too much.So let try to find a way to summarize what I’ve found relevant. Mobile security isn’t just for geeks Although many still does not think about mobile security as a real problem in nowadays business, people should try to think better at the actual landscape.  Let’s focus on some main points that also this week have been clearly exposed by news: mobile means a lot of different things…

Hakin9 StarterKit 2/2011 – DDOS Attacks | Magazine | IT Security …

Hakin9 StarterKit 2/2011 – DDOS Attacks | Magazine | IT Security …By EditorThe DDOS, a New „Old” Type of Attack! by Orlando Pivi In this article, Orlando presents the DDoS attack structure and the Botnet structure . He | Hakin9 StarterKit 2/2011 – DDOS Attacks | IT Security Magazine.IT Security Magazine – Hakin9… Related articles June Issue of Hakin9 Magazine: Access Control (felipemartins.info) US battery firms targeted in online attack (news.cnet.com) FBI Arrests Alleged Anonymous Members in Connection With PayPal Hack (portadiferro2.blogspot.com) CCP Joins The Club, Eve Online Targeted By DDoS Attack (portadiferro2.blogspot.com) Fending Off the Latest Cyber Crime, Web…

cloud security

Image via Wikipedia Dome9 Security Protects Access to WordPress Servers with Innovative Cloud …PR Newswire (press release)236) – Dome9 Security™, the leading provider of cloud server security management service for public and private clouds, as well as for dedicated and virtual private servers (VPS), today at HostingCon 2011 announced new support for the WordPress.org … Lessons in security leadership: Andy EllisNetwork WorldThis was 10 years ago, when cloud wasn’t on anyone’s radar. Danny and I went back and forth deciding the minimal set of controls needed for security, and there were days I didn’t think we’d ever build it. Then,…

Lesson from SecurID breach: Don’t trust your security vendor

Lesson from SecurID breach: Don’t trust your security vendorNetwork World… Security’s SecurID products have reportedly been central to the attacks, which fell on the heels of many other recent and high-profile attacks, such as those that hit Sony’s PlayStation Network, HBGary and NASDAQ’s Directors Desk web software used … Related articles Sony Goes Down…Again? (benzinga.com) Military Contractor Breached With SecurID Attack (beskerming.com) Sony network attacked again, hackers claim !! (technonxt.wordpress.com) Sony hacked again (americablog.com) Sony PlayStation Network restored in US, Europe (seattletimes.nwsource.com) Sony Pictures Falls Victim to Major Data Breach (pcworld.com) Sony restores PlayStation network (bbc.co.uk) A Different Take on…

Posts navigation