The Southern California Linux Expo (SCALE) 21x is a massive community-run open-source and free software conference. This year's event showcased various workshops, presentations, and networking events.
...
The Computer Emergency Response Team (CERT) Coordination Center, a security-incident clearinghouse, introduced on Monday a program to certify information technology professionals in incident handling and response.. . .
Matthew G. Marsh submitsThe Fifth Annual CERT Conference on Computer Security and Information Assurance will be held August 5-7, 2003. The online registration site is now open. Early bird registration closes July 10th. . .
This conference is designed by and for those responsible for Information Assurance programs in the public sector. The three-day agenda includes sessions on planning, managing, and funding IA initiatives throughout government enterprises. September 15 - 17, 2003 . . .
If not center stage, Linux and Open Source software certainly occupy a credible place within the upcoming CeBIT America 2003 conference and exhibition taking place at New York City's Jacob K. Javits Convention Center, reflecting the growing acceptance and use of . . .
In the quest for an ironclad information-security program, organizations typically take a textbook approach: First, a business-impact analysis and asset-assessment study identify critical data needing protection and the servers where that data resides. Then, security policies are developed from these studies, your business plan and organizational goals.. . .
Everybody has a plan to end spam these days. But the work the Anti-Spam Research Group is doing is different. The ASRG has the prestige to get its proposals put in place. The group is affiliated with the Internet Engineering Task Force (IETF), which sets the standards for the fundamental technologies that make the Internet possible.. . .
Leaders of several major open-source projects have joined George Washington University's Cyber Security Policy and Research Institute to push for greater government use of the Linux operating system.. . .
Following the success of last year's event, organization has begun for the HiverCon 2003 Corporate Security Conference. To be held in Dublin on November 6th-7th the venue is the Jurys Ballsbridge Hotel set in the heart of the city center. . .
Patrick Gray submits The Australian Federal Police are taking firm steps toward forging closer ties with the underground hacking community as evidenced at a recent security conference. Ruxcon, a conference organised by and for the Australian computer security community . . .
A group of application security vendors affiliated with the Organization for the Advancement of Structured Information Standards (OASIS) will next week announce a proposal for an XML standard for application vulnerabilities. The announcement will be made at the RSA Conference being held in San Francisco.. . .
The OpenBSD project hopes new changes to its latest release will eliminate "buffer overflows," a software issue that has been plaguing security experts for more than three decades.. . .
Mike Jackson, Linux Shadow Password HOWTO (LSPH) author, passed away on Friday, March 28th at the young age of 38. The Linux community has lost a great friend and advocate. In addition to maintaining the LSPH all these years Mike was . . .
The workshop offers a constructive environment for experienced researchers and practitioners as well as newer participants in the field. The result is a unique opportunity to exchange ideas. NSPW 2003 will take place August 18 - 21 at the Centro Stefano Francini (CSF), the conference center of the Swiss Federal Technical Institute.. . .
A group working to ensure the compatibility of Web services software is preparing to tackle its biggest challenge yet: Security. The Web Services Interoperability organization (WS-I) was formed last year at the behest of companies including IBM and Microsoft to see to it that Web services products from different companies work together.. . .
International hacker organization issues software license that allows the group or its licensees to take human rights violators to court. This story is important for anyone interested in hacking, human rights, information security, open-source software, Internet censorship, international law, international politics, or technology transfer.. . .
The new ISC BIND Forum will benefit members by focusing on security related issues, including early warning on attacks, defects, and patches. ISC's software is Open Source, and thus any critical information regarding the security of the protocol or implementation will be disclosed and explained to the Internet community. However, ISC believes that it is essential that critical Internet infrastructure such as root and TLD (Top Level Domain) servers are upgraded in a timely manner, and that vendors who ship BIND in their products have an opportunity to stay ahead of potential problems by delivering a patch for their customers before the public disclosure occurs. . . .
The Internet2 PKI Research activity is based on the premise that a great deal of research is needed in PK-authenticated authorization and control systems and that research is not all going to come out of current efforts among PKI vendors and . . .
What makes CERT/CC unique is that it functions as an independent security reporting center that assumes anonymity with each client unless it receives permission to use the client's identity. When officials at Carnegie Mellon University's CERT Coordination Center (CERT/CC) . . .
The majority of the successful attacks on operating systems come from only a few software vulnerabilities. This can be attributed to the fact that attackers are opportunistic, take the easiest and most convenient route, and exploit the best-known flaws with the . . .
Red Hat, Inc. (Nasdaq:RHAT), the world's premier open source and Linux provider, today announced the first Open Source Security Summit. The Security Summit will take place at Georgetown University in Washington, D.C. on October 29, and will be cohosted by Dell. The Security Summit will provide an open forum to discuss and explore how open source technologies, methodologies, tools, and support processes meet the challenges of securing networks and computer systems.. . .