Off the Wire

Off The Wire Archive

News items for May 2009

Whitepaper - The hidden dangers of spam
Learn how to combat spam, mitigate security risks, and restore productivity to companies grappling with an influx of illicit email. [more]
Thursday, 28 May 2009, 3:44 AM CET


Lessons from a reputational risk audit
Here is a recent lesson from one of our new Reputational Risk Audits that we have begun performing. [more]
Thursday, 28 May 2009, 3:42 AM CET


Whitepaper - Why security SaaS makes sense today
Keeping up with the new and the increasingly complex nature of Web and Email threats can be a daunting task for IT professionals. [more]
Friday, 15 May 2009, 1:50 PM CET


Scanning multiple Apache VirtualHosts with Nessus
Web sites have a way of evading vulnerability scanners in the form of virtual hosting. It is a common practice to host multiple web-sites (and associated applications) on a single web server using only one IP addresses. [more]
Tuesday, 12 May 2009, 3:26 PM CET


Whitepaper - Mitigating fraudulent transactions
Detect, investigate and respond to fraudulent transactions from within and outside an organization to address essential business operations. [more]
Tuesday, 12 May 2009, 3:25 PM CET


A step-by-step introduction to using the AUTOPSY Forensic Browser
This is a brief tutorial on how to use the Autopsy Forensic Browser as a front end for the Sleuthkit. This tool is an essential for Linux forensics investigations and can be used to analyze Windows images. [more]
Monday, 11 May 2009, 9:33 AM CET


Web murderer given life sentence
A man from Germany has been jailed for life after being found guilty of stabbing a Nottingham student 86 times after stalking his girlfriend. [more]
Monday, 11 May 2009, 8:30 AM CET


Whitepaper: SANS analyst review - log management
This white paper provides a requirements checklist for those considering options and features for their log management systems. [more]
Sunday, 10 May 2009, 5:58 PM CET


WAFs and anti-SDL assumptions
When someone advocates Web Application Firewalls (WAF), some people mistakenly assume they also must be anti-Security Development Lifecycle (SDL). [more]
Friday, 8 May 2009, 10:34 PM CET


Deconstructing a Webserver attack
I was looking for a good example to highlight two very useful and often overlooked features of Wireshark: the flexibility of tshark and the tool suiteís HTTPS/SSL decryption capability. [more]
Thursday, 7 May 2009, 8:31 AM CET


Best practices - 10 good reasons to use predictive analytics
Here are 10 really good reasons predictive analytics can help your business. [more]
Thursday, 7 May 2009, 7:43 AM CET


On clouds and the evolving role of the CISO
One of the fun things about being in Information Security is the amount of change our profession goes through. [more]
Thursday, 7 May 2009, 7:42 AM CET


Report: FBI mishandles terror watch list
The FBI canít figure out the right way to add or remove suspected terrorists from the countryís unified terrorist watch list, subjecting citizens to unjustified scrutiny from government officials and possibly putting the country at risk, the Justice Departmentís internal watchdog said Wednesday in a new report. [more]
Thursday, 7 May 2009, 3:22 AM CET


Office intruder 'steals' data
Have you ever wondered whether that unfamiliar face in the office is actually an intruder about to steal your data? Probably not, but maybe it is time to think again. [more]
Wednesday, 6 May 2009, 11:12 AM CET


3 steps to improving your data safeguards
Protecting data in dynamic and diverse environments is a formidable challenge. You need to focus on categorized data inventory, sharing mechanisms, and leak detection. Here's how. [more]
Tuesday, 5 May 2009, 7:05 AM CET


Whitepaper - The new encryption generation
This white paper examines the limitations of first-generation encryption processes that often deliver less-than-promised performance, spur user resistance, conflict with operational infrastructure and process requirements, and can even leave data stored in unencrypted locations where it is easily visible to unauthorized users. [more]
Monday, 4 May 2009, 12:15 AM CET


Mythbusting: Secure code is less expensive to develop
Conventional wisdom says developing secure software from the beginning is less expensive in the long run. [more]
Monday, 4 May 2009, 12:12 AM CET


Spotlight

The synergy of hackers and tools at the Black Hat Arsenal

Posted on 27 August 2014.  |  Tucked away from the glamour of the vendor booths and the large presentation rooms filled with rockstar sessions, was the Arsenal - a place where developers were able to present their security tools and grow their community.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Sep 1st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //