We all remember the cyber-attacks on Estonia last April. A lot of people are interested what really was going on during these attacks. You find a lot of sites looking into the technical analysis of the attack â€“ which could be more or less speculation. What I found recently and just had time to read…Details
Internet Telephony Has Security Problems: This was an interesting read this morning for different reasons: First of all, it is not surprising (even if we would not have known the problems it would have to be expected). I liked the statement: The goal is to raise awareness about flaws in these systems â€“ and create…Details
Does not solve any of the security problems (challenges?) but it sounds promising anyway
Building A Faster Internet
I start to get scared â€“ more and more. Back in September I blogged on Critical Infrastructure Protection â€“ Live which shows what would happen if somebody would be able to tamper with power generators. Now, during RSA there was a guy called Ira Winkler telling the audience that they had the job to do…Details
This is actually an interesting statement. If you had ever to deal with the press you know how these headlines are composed. It might be that the person actually made the sentence in this way â€“ the question is whether he meant it so absolute. Nevertheless, if you read the corresponding article on darkReading, I…Details
Last week we published â€“ as you hopefully know â€“ our “End to End Trust” whitepaper. If not, please read my blog post on it J Now, Eric Bidstrup just commented on End to End Trust in the light of the Security Development Lifecycle (or better: the other way around). It might be interesting for…Details
I was in Bratislava this week for an IDC Conference. During these kind of events I often talk to the press as well. Additionally I had this time the opportunity to talk to a pretty well-known blogger in Slovakia called Jozef VyskoÄ. You may have a look at his blog (provided your Slovakian is better…Details
The Federal Institute of Technology in Zurich released a study at Blackhat, which is definitely worth looking into. Now, let’s be serious: They looked at a metric they call 0-Day-Patch being the number of patches a vendor is able to release at the day of the public disclosure of a new vulnerability. We could discuss…Details
Ed Gibson, our CSA in the UK had an interview during Infosec with VNunet. He made some interesting statements: We have a good set of laws in place and they have teeth. But the police have priorities and budgets set by the Home Office and Any one of you here would volunteer for neighborhood watch…Details
There is an interesting article on the value of the Malicious Software Removal Tool (MSRT â€“ the tool we release monthly to clean PCs) and the fight against storm. It gives you some insight how our Malware Protection Center works and what they did against storm. A pretty interesting reading (even though I do not…Details
As you probably know: I am Swiss. We have a saying in Switzerland (I do not know whether something like this exists in English as well) that the kids of the shoemaker always have the worst shoesâ€¦ So, what about the security professionals? No, I am not talking about their shoes but what about the…Details
You might know Brian Komar. He wrote numerous books on PKI and Certificate Management and he is a well-known speaker at quite some events like TechEd and IT Forum. Now, nCipher organized a Webimar on Best Practices for Microsoft PKI & Certificate Management.
If you are interested, you might register at the link above.
I just read this article called 8 Dirty Secrets Of The Security Industry, which seems pretty nasty. Let’s briefly have a look at them: Vendors do not need to be ahead of the hackers; they only need to be ahead of the buyer: Wow, this is a bad statement â€“ but how true is it?…Details