Organizations/Events - Page 20

Discover Organizations/Events News

LayerOne Hacking Exposed

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

THG regularly covers LAN Parties, during which gamers drink, socialize and, of course, play games. However, hackers and other technology professionals have also been doing this for several years at conventions such as Defcon, Toorcon and more recently at (LayerOne) the first annual LayerOne conference June 12-13 at the Westin Hotel near the Los Angeles International Airport. . . .

DefCon 12 WarDriving Contest Registration Now Open

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Registration for the DefCon 12 WarDriving Contest is now open. For the first time ever the Def Con WarDriving contest will be divided into two parts. A "Main Drive" that will run for the entire three days and four "Mini-Games" that allow contestants that would like to participate but do not want to invest the entire Con in WarDriving. . . .

Announcing the Fourth WorldWide WarDrive (WWWD)

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The WWWD provides a snapshot of the security posture of currently deployed wireless access points throughout the world. During the Third WorldWide WarDrive, which took place in July 2003, over 88,000 unique access points were discovered worldwide. The statistics compiled for the WWWD have become the defacto standard for statistics used by many media outlets and wireless security vendors to further generate public awareness of wireless security issues. . . .

Infosecurity Europe 2004

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Infosecurity Europe 2004 opens its doors to over 10,000 buyers and sellers in IT Security. Infosecurity Europe provides the ultimate forum for sourcing opportunities, information updates and free educational forums, tackling the key technology issues set to affect your business . . .

Cyber-Security Firms Circle the Wagons

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The new Cyber Security Industry Alliance could benefit from greater cross-industry cooperation, says Giga Group security analyst Michael Rasmussen. "Otherwise this could be one more voice in the wilderness." . . .

DallasCon Network Security Boot Camp

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

April 27-30 , 2004 - 4 Days of Intense Hands-on Network and Wireless Security Training by Renowned Experts. Come to Dallas 4-Days prior to DallasCon 2004 and take part in this intense two-part, hands-on training developed to teach you the ins and outs of securing your Web-Enabled Services and Wireless Networks. In today's world, hacking and cyber attacks are becoming more common as tools to achieve them are more available and easier to use by hackers. . . .

Infosecurity conference focuses on mobility

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Scott Yelich, a Unix administrator at a large Wall Street investment banking firm, attended the exhibition to search for Unix and Linux security products. But he was also looking for technology that secures mobile devices, he said. Holding out his . . .

Debian Investigation Report

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Debian administration team and security experts are finally able to pinpoint the method used to break-in into four project machines. However, the person who did this has not yet been uncovered.. . .

New SC-L email discussion forum

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

I would like to announce the availability of a new and free resource to the software security community, the SC-L email discussion forum. The moderated forum is open to the public. The group's purpose is, "to further the state of the practice of developing secure software, by providing a free and open, objectively moderated, forum for the discussion of issues related to secure coding practices throughout a software development lifecycle process (including architecture, requirements and specifications, design, implementation, deployment, and operations).". . .

Security expert proposes hackers' union

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A proposal to create an association to represent the interests of hackers and vulnerability researchers is gaining support, a security expert said Wednesday. The group, which would be geared toward researchers and not software vendors, would provide guidelines on vulnerability disclosures . . .

Security: From Theory to Practice

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Secure Trusted Operating System Consortium (STOS) announced Friday the keynote speakers for its fifth annual symposium to be held December 1-5, 2003 at George Washington University in Washington, DC. Anyone involved in securing Mac OS X or BSD systems or . . .

Security spec gets an upgrade, broader backing

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Trusted Computing Group passed a milestone in its efforts to improve computer security this week, announcing a key update of its specification. The update comes as the TCG adds Sun Microsystems Inc. to its membership and forms a new working . . .

Clarify security ROI, experts urge

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Companies will have to change the way they sell security products, analysts have advised. The security-selling problem stems from IT staff and management executives holding different views on what constitutes a return on investment (ROI).. . .

Knowledge Center: Four ways to secure your company on a shoestring budget

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If your company lacks the basics--antivirus software, firewalls and other basics--then your organization is in serious trouble. The only way you can survive in this situation is if you are not connected to the outside world at all. If you are in this unfortunate situation and can't convince your senior management of the extreme danger of this position, then I'd suggest you polish your resume, hone your skills and start packing.. . .

The State of Information Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The best place to start is with what "The State of Information Security 2003" survey doesn't include. It doesn't include some stark bit of data that will make you slap your forehead and exclaim, "Oh, that's the problem!" It doesn't include figures that suggest a secret formula for setting a security budget.. . .

Taking the Security Message to the Suits

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Where does the security buck stop? All of the certifications and training in the world won't make any difference to the security of corporate networks if senior managers and top executives don't understand the problems and requirements faced by security professionals, a consultant and former CIO said in a Wednesday keynote speech here at the Security Decisions 2003 conference.. . .

Network Security Symposium 2003

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Are network intrusion detection systems (NIDS) still relevant? With the emphasis shifting to network intrusion protection in the last two years, this technology looks like it is on its last legs. But is it? Related to intrusion detection and protection . . .

Will Security Professionals Get Promoted?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As CEOs turn to security professionals to protect the enterprise, it's about time some security professionals became top executives themselves. Security is finally becoming a primary IT job function. But does it mean that security professionals will be granted their own role in executive management?. . .