Archive

Archive for December, 2005

Cisco Response to Black Hat Presentation

December 29th, 2005
Comments Off on Cisco Response to Black Hat Presentation

Cisco Systems’ response to the Federal District Court’s issuance of a permanent injunction against Michael Lynn and Black Hat, Inc. from further disclosure of code and code pointers that could aid in the development of an exploitation of a network infrastructure: We are gratified with the court’s actions.
Read more…

Uncategorized

Cisco to Silence Security Researcher

December 28th, 2005
Comments Off on Cisco to Silence Security Researcher

A critical security flaw discovered in an operating system that runs the majority of the world’s computer networks would, if exploited, could expose the internet to a crippling attack and allow attackers to bring down critical infrastructures, according to a security research company.
Read more…

Uncategorized

Data Storage and Infrastructure Management

December 28th, 2005
Comments Off on Data Storage and Infrastructure Management

The volume of data generated and stored by businesses is growing at an uncontrollable rate and companies have invested substantially in IT systems to help manage this growth. The challenge they face is how to manage their data storage infrastructure cost-effectively. This means developing smarter ways to juggle spend without compromising quality of service.
Read more…

Uncategorized

How vulnerable do you feel?

December 27th, 2005
Comments Off on How vulnerable do you feel?

Business continuity may be seen as an after-thought or ´added extra´, but in truth it lies at the heart of good business practice. As organisations become more connected in this increasingly networked world, the vulnerabilities they face are changing and growing.
Read more…

Uncategorized

Products Supporting Sarbanes-Oxley Compliance

December 26th, 2005
Comments Off on Products Supporting Sarbanes-Oxley Compliance

Over 500 hours of vendor and user research was invested to identify, analyze and map over 100 technology vendors supporting Sarbanes-Oxley compliance, fraud detection and financial statement audits. Given the niche market for these technologies, there have been limited studies to date, especially to this extent.
Read more…

Uncategorized

Data, Compliance Seen as Key Driver for Customers

December 26th, 2005
Comments Off on Data, Compliance Seen as Key Driver for Customers

A survey conducted by Network Intelligence reveals that nearly all customers capture and manage all the data from various devices for regularity compliance reporting and alerting. In addition, all the data future-proofs Sarbanes-Oxley, HIPPA are also critical to security correlation projects.
Read more…

Uncategorized

Instant messaging – comms godsend or security back door?

December 26th, 2005
Comments Off on Instant messaging – comms godsend or security back door?

As 60,000 users of Reuters messaging service found out in April, an instant messaging worm can seriously damage your day. The pernicious Kelvir worm, which spreads by sending copies to everyone on an infected client´s IM contact list, swept through the company so fast that Reuters shut down the service rather than let the worm propagate itself any further.
Read more…

Uncategorized

Ten Reasons towards Cryptography

December 25th, 2005
Comments Off on Ten Reasons towards Cryptography

Cryptography is already the de facto way of securing sensitive web traffic and it is now reaching across the entire enterprise as companies start to use industry-standard protocols such as SSL internally – even between servers only a few feet apart.
Read more…

Uncategorized

Cryptography is Next Generation Security

December 25th, 2005
Comments Off on Cryptography is Next Generation Security

Encryption will play an increasingly central role in the future of mainstream enterprise security. In a more distributed, yet closely unified infrastructure where the emphasis is shifting away from simply securing the enterprise perimeter, cryptography is vital for data-level protection to guard information assets and enforce robust access controls for users, devices and administrators.
Read more…

Uncategorized

Demystifying Security Enhanced Linux

December 23rd, 2005
Comments Off on Demystifying Security Enhanced Linux

In this paper I will try to explain the philosophy behind the Security Enhanced Linux (SE Linux). I will however try to explain the concept with an example but to keep the length readable I will restrain myself to go into much of implementation details for e.g. commands and similar stuff.
Read more…

Uncategorized