Insomni’hack 2013 took place last week at Geneva and I had the opportunity to attend. Insomni’hack DAY 1 consisted of one day workshops on subjects ranging from “Linux exploitation” to “How to make sure your Pentest Report is never empty”. I had the chance to attend a workshop on “Practical ARM exploitation” given by black Steve (@s7ephen) and white Steve (Stephen Lawler)
2013 BlackHat Europe
BlackHat Europe was last week, and Fortiguard Labs members were there for the briefings. Again this year, the 2 days event took place in Amsterdam downtown
Cloud Security Alliance (CSA) says Data Breach, Loss Top Cloud Threat List
A new survey of industry experts from the Cloud Security Alliance (CSA) finds data breach and data loss at the top of nine critical threats to cloud security. Cloud computing is more mainstream among businesses and government now than ever before. CSA’s “The Notorious Nine: Cloud Computing Top Threats in 2013” report details the development of the cloud service model and how it delivers business-supporting technology more efficiently.
RSA Conference 2013: New Threats, New Solutions
The keynote speakers have gone home, the parties have ended, and another RSA Conference 2013 is over. By all reports, this year set records for attendance and business conducted. With a complex and evolving threat landscape and the accelerating adoption of disruptive technologies, exhibitors had a field day on the show floor with sophisticated releases that vied to differentiate in the burgeoning security markets
Twitter Hacks: How Avoid Being the Next Victim
Perhaps it had been too long since Twitter was the center of the public attention. Drama junkies were treated to a triple-whammy of cyber news this week when miscreants hacked into the Twitter accounts of Jeep, Burger King and none other than the global hacker collective Anonymous. In an ironic twist of plot, the infamous hacker group’s Twitter account was apparently overtaken by rival hacktivists, according to the BBC.
IT Complexity Bolsters Argument for Managed Security
The forward drive and accompanying expense found in the integration of existing systems and infrastructure with new technologies is placing pressure on organizations to rethink network security strategies. Increasing complexity of both IT and physical security requirements, observes Frost & Sullivan in its “Analysis of the Global Managed Security Services Market” (Feb
FortiOS 5
http://www.youtube.com/v/63pEDn5iMKI?version=3&f=user_uploads&app=youtube_gdata You Can Learn More About the Fortinet Product Line By Going to www.FirewallShop.com/Fortinet The original article/video can be found at FortiOS 5
The wait is over! Desktop Central adds Mobile Device Management capability
Pinch yourself. Desktop Central adds Mobile Device Management capability to its portfolio.
Mobile IT Management with Mobile Admin™ from SolarWinds®
Learn more here! www.solarwinds.com Join SolarWinds Sales Engineer Nomar Bodon on a guided tour of SolarWinds Mobile Admin. He’ll show you how you can manage your IT tasks from anywhere while using your iPhone®, iPad®, Android™ phone or tablet, or BlackBerry® device, and how Mobile Admin can help you find a better work-life balance. Learn how to solve IT problems through Mobile Admin Software’s integration with Microsoft® Exchange® and SolarWinds Orion.
New in Applications Manager: Improved java transaction monitoring, iPhone app & more.
We had two releases back-to-back last month with versions 10.4 and 10.5 coming out. What’s new in these releases? Well, web transaction monitoring just got way better