What We're Reading, Week of 7/25

MercuryNews.com, How to stay safe online while traveling Network World, IT security’s scariest acronym: BYOD, bring your own device Fast Company, It’s Time To Cut Back On “Hack” Help Net Security, Companies Underestimate Costs of Security Breaches BusinessNewsDaily, Is Allowing Employees Remote Access to the Office Creating a Security Threat?...

What We’re Reading, Week of 7/25

MercuryNews.com, How to stay safe online while traveling Network World, IT security’s scariest acronym: BYOD, bring your own device Fast Company, It’s Time To Cut Back On “Hack” Help Net Security, Companies Underestimate Costs of Security Breaches BusinessNewsDaily, Is Allowing Employees Remote Access to the Office Creating a Security Threat?...

Conversation with Travis Carelock, technical director at Black Hat, Part 1

Next week is Black Hat in Las Vegas, which is one of the world’s biggest shows for techies and hackers. We were lucky to catch up with Travis Carelock, technical director for the show, to chat with him about this year’s show. VPN Haus: What are the expected trends at the this year’s show? What topics and sessions are getting a lot of buzz? Travis Carelock: We are very excited about our keynotes.  We are very fortunate to have highly respected individuals from both the public and private sectors.  Ambassador Cofer Black, was director of the CIA’s Counterterrorist Center during the 9/11 attacks.  He has since gone on to have a very successful career in the private world serving the information security sphere.   His reflections over the last decade will provide attendees with an amazing view of the frontlines from someone who lived it. Our second keynote, Peiter “Mudge” Zatko of DARPA.  He is an infamous  “old school hacker” from the L0pht days.  Mudge will tell us what the government can learn from a hacker, and because turn about it always fair play, what a hacker can learn from the government. At Black Hat we have always delivered content centered on the latest attacks and zero days in many of IT’s most ubiquitous systems. However, one of the most surprising trends this year is all the attack vectors that are “outside” of the norm.  We have some fascinating presentations on attacking SCADA systems, mobile device management systems, embedded webservers, wireless medical devices, laptop batteries, banking cards, USB devices, and even with UAVs (that’s right Unmanned Aerial Vehicles).  The obvious...

What We're Reading, Week of 7/18

Infosecurity, Data breaches show need for better encryption key, certificate management ComputerworldUK, The Sun hacked: How it happened  Mobile Enterprise, How Secure Is Your Branch Networking? Dark Reading, OMB Issues Security Guidelines For Federal Telecommuters NetworkSecurityEdge, Security Departments Focus on Network Speed over Network...

What We’re Reading, Week of 7/18

Infosecurity, Data breaches show need for better encryption key, certificate management ComputerworldUK, The Sun hacked: How it happened  Mobile Enterprise, How Secure Is Your Branch Networking? Dark Reading, OMB Issues Security Guidelines For Federal Telecommuters NetworkSecurityEdge, Security Departments Focus on Network Speed over Network...