I have been fortunate enough to attend several Security BSides events this fall, I have seen a lot of good talks and been engaged in several great conversations. Two talks, one at BSides in Dallas/Ft. Worth and one the following week in Ottawa touched on similar issues that really resonated with me
Tips for providing (hopefully) secure access to web application servers
Last week we discussed why retail organizations must consider web application security when hosting an ecommerce site. Now I would like to provide some tips on how to provide secure access to web application servers. Layered Defense Firewalls and IPS systems still have their place and can help guard against simple exploits and Denial of Service attacks.
Fortinet – Dictate the Decade
Fortinet celebrates 10 years of innovation and thought leadership in the computer security industry.
Botnets Part 1
See actual malicious code and understand how it works. Corey Nachreiner explains botnet architecture for beginners, then builds a bot client.
Security Minute – November Edition
In this episode, Derek Manky discusses the drop in spam after the Bredolab takedown, the Koobface takedown and subsequent resurrection, and also features a wrap-up on Hiloti.
Rootkits Part Three
Topics chosen by user vote. Kernel mode rootkits; leading techniques and tools for detecting rootkits; how your Firebox helps stop rootkits from entering your network.
End of Sale Announcement For Astaro Report Manager
This is a general notice that Astaro Report Manager (ARM) will no longer be sold beginning December 31st, 2010. Customers can still continue to receive support for ARM with their ASG V7 installations until the end of 2011.
Up2Date 7.508 Released – Upgrade Appliances to Version 8
This morning, ASG version 7.508 has been released. The focus of this package is a one-touch upgrade from ASG version 7 to version 8 for ASG appliances, along with some final polish to accommodate the GA-release of our Wireless Security products
Bud Logs In
Watch as hapless Bud makes every password mistake in the book! Shudder as he blunders through one near calamity after another. Chuckle at the painful familiarity of his plight. Will Bud ever succeed in his quest to LOG IN?
How Password Crackers Work
This video demonstrates an automated tool that hackers use when decrypting password files.