At Black Hat Europe we met Stefano Zanero who talked about anomaly-based unsupervised intrusion detection. In this video he provides an overview of his research into the subject by illustrating how he worked trying to find ways to detect intruders without relying on signatures. To get more information about the subject take a look at his whitepaper and his presentation from Black Hat Europe 2007.
Posted on 23 January 2015. | The DMARC specification has emerged in the last couple years to pull together all the threads of email authentication technology under one roof—to standardize the method in which email is authenticated, and the manner in which reporting and policy enforcement is implemented.
Posted on 23 January 2015. | Adobe has released an out-of-band update for Flash Player, which fixes a security flaw (CVE-2015-0310) that could be used to circumvent memory randomization mitigations on the Windows platform.
Posted on 21 January 2015. | Brandon Hoffman, Lumeta's CTO, talks about the management strategies that are essential in the information security industry. He also offers advice to those stepping into the CTO role for the first time, and talks about the evolution of network situational awareness.