Monthly Archives: December 2005

Cisco Response to Black Hat Presentation

Cisco Systems’ response to the Federal District Court’s issuance of a permanent injunction against Michael Lynn and Black Hat, Inc. from further disclosure of code and code pointers that could aid in the development of an exploitation of a network infrastructure: We are gratified with the court’s actions.

Cisco to Silence Security Researcher

A critical security flaw discovered in an operating system that runs the majority of the world’s computer networks would, if exploited, could expose the internet to a crippling attack and allow attackers to bring down critical infrastructures, according to a security research company.

Data Storage and Infrastructure Management

The volume of data generated and stored by businesses is growing at an uncontrollable rate and companies have invested substantially in IT systems to help manage this growth. The challenge they face is how to manage their data storage infrastructure cost-effectively. This means developing smarter ways to juggle spend without compromising quality of service.

How vulnerable do you feel?

Business continuity may be seen as an after-thought or ´added extra´, but in truth it lies at the heart of good business practice. As organisations become more connected in this increasingly networked world, the vulnerabilities they face are changing and growing.

Products Supporting Sarbanes-Oxley Compliance

Over 500 hours of vendor and user research was invested to identify, analyze and map over 100 technology vendors supporting Sarbanes-Oxley compliance, fraud detection and financial statement audits. Given the niche market for these technologies, there have been limited studies to date, especially to this extent.

Data, Compliance Seen as Key Driver for Customers

A survey conducted by Network Intelligence reveals that nearly all customers capture and manage all the data from various devices for regularity compliance reporting and alerting. In addition, all the data future-proofs Sarbanes-Oxley, HIPPA are also critical to security correlation projects.

Instant messaging – comms godsend or security back door?

As 60,000 users of Reuters messaging service found out in April, an instant messaging worm can seriously damage your day. The pernicious Kelvir worm, which spreads by sending copies to everyone on an infected client´s IM contact list, swept through the company so fast that Reuters shut down the service rather than let the worm… Read More »

Ten Reasons towards Cryptography

Cryptography is already the de facto way of securing sensitive web traffic and it is now reaching across the entire enterprise as companies start to use industry-standard protocols such as SSL internally – even between servers only a few feet apart.

Cryptography is Next Generation Security

Encryption will play an increasingly central role in the future of mainstream enterprise security. In a more distributed, yet closely unified infrastructure where the emphasis is shifting away from simply securing the enterprise perimeter, cryptography is vital for data-level protection to guard information assets and enforce robust access controls for users, devices and administrators.

Demystifying Security Enhanced Linux

In this paper I will try to explain the philosophy behind the Security Enhanced Linux (SE Linux). I will however try to explain the concept with an example but to keep the length readable I will restrain myself to go into much of implementation details for e.g. commands and similar stuff.