Organizations/Events - Page 22

Discover Organizations/Events News

Red Hat Joins Forces with Dell, Public- and Private-Sector Leaders to Launch First Open Source Secur

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Red Hat, Inc. (Nasdaq:RHAT), the world's premier open source and Linux provider, today announced the first Open Source Security Summit. The Security Summit will take place at Georgetown University in Washington, D.C. on October 29, and will be cohosted by Dell. The Security Summit will provide an open forum to discuss and explore how open source technologies, methodologies, tools, and support processes meet the challenges of securing networks and computer systems.. . .

Start-up banks on hack-proof Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Start-up Guardian Digital has launched an effort to sell a version of Linux that's less vulnerable to attack, a niche the company hopes will gain it a foothold in the market for the Unix-like operating system. The Allendale, N.J.-based start-up released its EnGarde Secure Professional product Tuesday, a version of Linux that comes with management tools and server software designed to thwart attacks.. . .

Educating Executives

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here are examples of the types of questions you are sure to face at some point in your endeavors. Of course, each answer you give is sure to spawn even more queries. Q. What will it take for our company to be 100% secure? (This is one of those questions that is almost laughable except that it is asked far too frequently.) A. Unfortunately, it is impossible to reach a state of 100% security.. . .

CodeCon: Call For Papers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

CodeCon is the premier showcase of active hacker projects. It is an excellent opportunity for developers to demonstrate their work, and for coding hackers to find out about what's going on in their community. All presentations must be accompanied by . . .

Vegas Braces for DefCon

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Sin City is about to be packed with thousands of hackers, wannabe geeks and phreaks who envision the perfect world as the following: Computer networks would welcome curious exploration, all information would be openly shared, a lot of public toilets would . . .

Cyberterrorism Conference Coming Up

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A global summit focusing on cyberterrorism and the targets of critical infrastructures has been announced for next month. The event, Sector 5, will be co-produced by Gardner and Flight Event Work, and held in Washington, D.C., between August 21 and 23. . .

Security Industry's Hacker-pipming Slammed

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

I spent three days at H2K2 hoping someone would say something worth mentioning in The Register. Finally, on Sunday, a couple of speakers did just that (on which more tomorrow). Best of all was Gweeds' savage synopsis of a thing which. . .

Whole Lot of Happy Hacker Campers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Just eight hours after the East Coast's largest hacking conference opened its doors Friday, H2K2 had already taken on the feel of summer camp for enthusiastic engineers. While most are here to hack around the clock for a few days and. . .

Hacker group targets Net censorship

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Some of the world's best-known hackers unveiled a plan this weekend to offer free software to promote anonymous Web surfing in countries where the Internet is censored, especially China and Middle Eastern nations. An international hacker group calling itself Hactivismo released a program on Saturday called Camera/Shy that allows Internet users to conceal messages inside photos posted on the Web, bypassing most known police monitoring methods.. . .

Who To Call About Computer Crime

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

How businesses should deal with law enforcement was a topic of discussion at INT Media Group's recent E-Security Conference and Expo in Vienna, Va. In separate sessions, attendees heard from David Green, principal deputy chief of the Department of Justice Computer . . .

Chief (in)security officer

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The departure of these and other information security veterans from Fortune 500 companies reflects the beginning of turbulent times for chief security officers (CSO). Since Sept. 11, CSOs have faced new pressures to prove the value and effectiveness of their security measures, even as they struggle politically for legitimacy within their corporations and for support from the technology and business units they're trying to protect, say analysts.. . .

Security firms tout savings, not safety

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

At a recent publicity event here, two security companies and accounting giant PricewaterhouseCoopers showed off their latest tool for selling software: a calculator that lets clients estimate how much money they can save by using the companies' offerings.. . .

Desperately Seeking the Security ROI

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Talk may be cheap, but the infosec price tag is not. It shouldn't come as a surprise that the infamous TCO (total cost of ownership) and ROI (return on investment) justifications have descended upon the unsuspecting troopers in the infosec trenches. Apparently, it's time for us security geeks to learn some new tricks.. . .

Anti-Spammers at Odds Over MAPS Legal Issues

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Anti-spammers are in disarray as a former employee is accusing Mail Abuse Prevention System LLC of "slimy" legal tactics. Nick Nicholas, former executive director at MAPS, posted comments online last week contending that MAPS executives had filed lawsuit affidavits that "are full of factual errors and material misrepresentations.". . .

Security Still an 'Afterthought'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Despite the current emphasis on security in the IT industry, CIOs and IT managers are still not paying enough attention to the problems facing their organizations, a panel of security experts said Wednesday. "Security is still very much an afterthought," said . . .

A New Degree Of Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The University of Texas at Dallas has joined forces with businesses and law-enforcement officials to create a center for cybercrime education and research. The Digital Forensics and Security Institute includes the collaborative efforts of the Greater Dallas Crime Commission, the . . .

Def Con 10 Convention

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The 10th anniversary of what has become the largest hacker convention on the planet! DEF CON 10 will be August 2nd to the 4th at the Alexis Park Hotel and Resort in Las Vegas, Nevada, USA.. . .