Enterprise News
After my "It's not easy being an Englishman" post last Saturday, I noted that " My wife - who just happens to be a "pommy', has already inflicted all the real pain any man is entitled to endure." Also, as a penance, I have to appease my better half with this post. My lovely wife is involved with Corporate IT, and often remarks on the lack of posts in that area.
These are for you darling.....
KCpentrix 2.0
The Kcpentrix Project was founded in May 2005 , KCPentrix 1.0 was liveCD designed to be a standalone Penetration testing toolkit for pentesters, security analysts and System administrators
What's New in KcPentrix 2.0: Now release 2.0 is a liveDVD, It features a lot of new or up to date tools for auditing and testing a network, from scanning and discovering to exploiting vulnerabilities
Read more [and download ] HERE.
Security Appliances Sitting Ducks
Calyptix Security, has discovered that CSRF (cross-site request forgery), a type of vulnerability that typically concerns large sites like Amazon.com, Google and Digg, also affects a vast array of the security devices that enterprises plunk down at the heart of their defense systems.
Read the article HERE.
How to be a digital detective
What every network manager should know about computer forensics. Whatever the reason, it's possible at some point there will be an incident at your company that will require the IT department to conduct a formal investigation tracking the digital trail of an employee. Will you know what to do?
Read the article HERE.
The iPhone Enterprise Experience
Coming at it from a security standpoint, I'm appalled: How could anyone allow these strange, unmanaged things onto their network? There's point one about it all in my last sentence: If you have a management system of any kind to deal with security, it's unlikely to be able to manage an iPhone.
Read the article HERE.
Security guru Clarke: safe networks don't exist
Remember that 80's classic War Games? You know, the one with Matt Broderick and Ally Sheedy about a California teen who hacks into a Pentagon war simulation computer WOPR (for War Operation Plan Response)? Well, former White House cyber-security expert Richard A. Clarke told a gathering of enterprise executives and data protection specialists that they should load it up in their NetFlix queue and watch it...very carefully. Why? because the movie gives a good depiction of how porous most enterprise networks are these days, Clarke said.
Read the article HERE.
Users: Encryption No Silver Bullet
Encrypting data as it travels across corporate networks could be a distraction from the real security challenges facing organizations, warned IT managers at a security event here today. "Why would anyone attempt to attack an encrypted file when all they have to do is send out a phishing email or attach a keylogger and get the information that way?" he said. "You have got to worry about the endpoints -- criminals are going to go for the low-hanging fruit."
Read the article HERE.
These are for you darling.....
KCpentrix 2.0
The Kcpentrix Project was founded in May 2005 , KCPentrix 1.0 was liveCD designed to be a standalone Penetration testing toolkit for pentesters, security analysts and System administrators
What's New in KcPentrix 2.0: Now release 2.0 is a liveDVD, It features a lot of new or up to date tools for auditing and testing a network, from scanning and discovering to exploiting vulnerabilities
Read more [and download ] HERE.
Security Appliances Sitting Ducks
Calyptix Security, has discovered that CSRF (cross-site request forgery), a type of vulnerability that typically concerns large sites like Amazon.com, Google and Digg, also affects a vast array of the security devices that enterprises plunk down at the heart of their defense systems.
Read the article HERE.
How to be a digital detective
What every network manager should know about computer forensics. Whatever the reason, it's possible at some point there will be an incident at your company that will require the IT department to conduct a formal investigation tracking the digital trail of an employee. Will you know what to do?
Read the article HERE.
The iPhone Enterprise Experience
Coming at it from a security standpoint, I'm appalled: How could anyone allow these strange, unmanaged things onto their network? There's point one about it all in my last sentence: If you have a management system of any kind to deal with security, it's unlikely to be able to manage an iPhone.
Read the article HERE.
Security guru Clarke: safe networks don't exist
Remember that 80's classic War Games? You know, the one with Matt Broderick and Ally Sheedy about a California teen who hacks into a Pentagon war simulation computer WOPR (for War Operation Plan Response)? Well, former White House cyber-security expert Richard A. Clarke told a gathering of enterprise executives and data protection specialists that they should load it up in their NetFlix queue and watch it...very carefully. Why? because the movie gives a good depiction of how porous most enterprise networks are these days, Clarke said.
Read the article HERE.
Users: Encryption No Silver Bullet
Encrypting data as it travels across corporate networks could be a distraction from the real security challenges facing organizations, warned IT managers at a security event here today. "Why would anyone attempt to attack an encrypted file when all they have to do is send out a phishing email or attach a keylogger and get the information that way?" he said. "You have got to worry about the endpoints -- criminals are going to go for the low-hanging fruit."
Read the article HERE.
0 Comments:
Post a Comment
<< Home