Cisco Systems’ response to the Federal District Court’s issuance of a permanent injunction against Michael Lynn and Black Hat, Inc. from further disclosure of code and code pointers that could aid in the development of an exploitation of a network infrastructure: We are gratified with the court’s actions.
A critical security flaw discovered in an operating system that runs the majority of the world’s computer networks would, if exploited, could expose the internet to a crippling attack and allow attackers to bring down critical infrastructures, according to a security research company.
The volume of data generated and stored by businesses is growing at an uncontrollable rate and companies have invested substantially in IT systems to help manage this growth. The challenge they face is how to manage their data storage infrastructure cost-effectively. This means developing smarter ways to juggle spend without compromising quality of service.
Business continuity may be seen as an after-thought or ´added extra´, but in truth it lies at the heart of good business practice. As organisations become more connected in this increasingly networked world, the vulnerabilities they face are changing and growing.
Over 500 hours of vendor and user research was invested to identify, analyze and map over 100 technology vendors supporting Sarbanes-Oxley compliance, fraud detection and financial statement audits. Given the niche market for these technologies, there have been limited studies to date, especially to this extent.
A survey conducted by Network Intelligence reveals that nearly all customers capture and manage all the data from various devices for regularity compliance reporting and alerting. In addition, all the data future-proofs Sarbanes-Oxley, HIPPA are also critical to security correlation projects.
As 60,000 users of Reuters messaging service found out in April, an instant messaging worm can seriously damage your day. The pernicious Kelvir worm, which spreads by sending copies to everyone on an infected client´s IM contact list, swept through the company so fast that Reuters shut down the service rather than let the worm… Read More »
Cryptography is already the de facto way of securing sensitive web traffic and it is now reaching across the entire enterprise as companies start to use industry-standard protocols such as SSL internally – even between servers only a few feet apart.
Encryption will play an increasingly central role in the future of mainstream enterprise security. In a more distributed, yet closely unified infrastructure where the emphasis is shifting away from simply securing the enterprise perimeter, cryptography is vital for data-level protection to guard information assets and enforce robust access controls for users, devices and administrators.
In this paper I will try to explain the philosophy behind the Security Enhanced Linux (SE Linux). I will however try to explain the concept with an example but to keep the length readable I will restrain myself to go into much of implementation details for e.g. commands and similar stuff.