InformationWeek and Dark Reading Virtual Event: Risk, Protection, and Access: Mastering Todays Security Threats



If you are not automatically redirected, please click here.

Live
OnDemand
Closing Video by InformationWeek Contributing Editor & Conference Chair Steve Kovsky
Cyberwars and Cyberterrorism: The Collateral Damage to Commercial Business
In this groundbreaking panel, directors of the Cyber Storm II will publicly discuss the top-secret cybersecurity exercise, and what was achieved toward the DHS goal of coordinating and strengthening cyber preparedness throughout the public and private sectors. Officials will be joined by top cyberwar and cyberdefence experts will shed new light on ways informational warfare could affect your enterprise network – and what you can do to protect your organization.
How Do They Do That? Hacker Secrets Revealed
Hackers give their insights on the weakest points in enterprise security, how they find holes in corporate defenses and how they could exploit those vulnerabilities (if it wouldn't get them arrested in the middle of the presentation). This session will help you to understand how attackers work and what you can do to protect your enterprise against them. Learn how to defend your organization against a host of recently discovered hacks that could leave your company’s most precious information assets at the mercy of data thieves and digital miscreants.
Managing Risk and Bringing Rigor to Information Security
The good news from the2008 InformationWeek Strategic Security survey shows is that information security is getting the financial attention it deserves. The bad news? Organizations may be no safer for the spending: 66% of respondents say their vulnerability to breaches and malicious code is either the same as last year (53%) or worse (13%). We are lagging behind in implementing encryption to protect customer and employee data, and since when is "no worse than before" an acceptable return on investment? IT is years behind other disciplines in adopting systematic risk management processes. However, those technology professionals who have made the leap say the change in perspective has made a profound impact. In short, risk management principles bring rigor to information security. The survey shows that many organizations are still looking at security in a tactical manner.
Q&A with Kevin Mitnick
Kevin Mitnick addresses your questions
Ten Security Threats Your Organization May Be Unable to Prevent
Leading industry analysts and security researchers reveal the most dangerous security threats and vulnerabilities that currently imperil many enterprise environments - including several that you may not have heard anything about, potentially rendering your organization unprepared and defenseless. You’ll hear firsthand insight and analysis on how attackers are targeting businesses, including the use of botnets, phishing, and Web vulnerabilities to break through corporate defenses.
Welcome to Risk, Protection, and Access: Mastering Today's Security Threats
Welcome Video from Steve Kovsky, InformationWeek and Dark Reading Contributing Editor & Conference Chair
Live
OnDemand
Jon Noetzel, Brett Lambo, Timothy Thomas, & Steve Kovsky
Jon Noetzel
Exercise Director of Cyber Storm II
General Dynamics Advanced Information Systems

Brett Lambo
Director of Cyber Exercises Program
U.S. Department of Homeland Security's National Cyber Security Division (NCSD)

Timothy Thomas
Analyst
Foreign Military Studies Office

Steve Kovsky
Contributing Editor and Conference Chair
InformationWeek and Dark Reading
Joshua Perrymon, “RSnake” Hansen, Robert Graham, Chris Nickerson & Kelly Jackson
Joshua Perrymon
CEO
PacketFocus

Robert (“RSnake”) Hansen
Principal
SecTheory

Robert Graham
CEO
Errata Security

Chris Nickerson
CEO
Lares Consulting

Kelly Jackson Higgins
Senior Editor
Dark Reading
Kevin Mitnick and Tim Wilson
Kevin Mitnick
Founder
Mitnick Consulting, LLC

Tim Wilson
Site Editor
Dark Reading
Neils Johnson
Neils Johnson
Symatec
Rich Mogull and HD Moore
Rich Mogull
Founder and Principle Analyst
Securosis

HD Moore
Founder
Metasploit

Trey Ford Director of Solutions Architecture WhiteHat Security

Tim Wilson Site Editor Dark Reading


Steve Kovsky
Steve Kovsky
Contributing Editor and Conference Chair
InformationWeek and Dark Reading
Garmin Nuvi
Win a Garmin Nuvi
Gas Card
Win a Gas Card
Win a JVC Camcorder
Win an Xbox
Arcsight
Blue Coat
Breach Security
Core Security
Help Booth
InformationWeek - Dark Reading Security Booth
NitroSecurity
Prize Center
Proofpoint
Sunbelt Software
Symantec
TechWeb Lounge
Thawte
Webroot
ArcSight
Arcsight
ArcSight is a leading global provider of compliance and security management solutions that protect enterprises and government agencies. ArcSight helps customers comply with corporate and regulatory policy, safeguard their assets and processes, and control risk. The ArcSight platform collects and correlates user activity and event data across the enterprise so that businesses can rapidly identify, prioritize, and respond to compliance violations, policy breaches, cybersecurity attacks and insider threats.
ArcSight, documents, whitepaper, networking, chat, security, compliance, IdentityView, Log Management, Logger, SIEM, Security Information Event Management, Event mangement, Gartner MQ leader, Gartner, PCI DSS, User management, fraud, government, retail, finance, banking, insurance, higher education, healthcare, automotive, universities, energy, utilities, safeguard, assets, network, MSSPs, telecom, protect, business, compliance, financial services, risk, protection, access, HIPAA, JSOX, SOX, sarbanes-oxley, FISMA, SB 1386, IT Governance, ISO 17799, ESM, Network configuration, enterprise, SMB, mid-market, event collection, identity monitoring, automatic discovery, configuration audit and provisioning
Blue Coat
Visit the Blue Coat booth. We offer solutions for a Secure Web Gateway, WAN Optimization and Business Applications that accelerate business processes without compromising data security. The Web is an incredible tool and an almost limitless resource, but providing access creates some unique security problems. We can help manage some of your toughest IT and business challenges. Control Is Yours.
Blue Coat, Secure Web Gateway, security solutions, Gartner Magic Quadrant, content filtering, web filter, remote users, security threat, web threats, hackers, network security, application performance, proxy client, enterprise WAN, application acceleration, encrypted SSL, protect web infrastructure, application delivery network, malware defenses, data loss prevention, DLP, compliance, governance, web application security, spyware protection, IM controls, skype controls, remote workers, remote access, policy enforcement, access control, web content filter, security policies,
Breach Security
Founded in 2004, Breach Security, Inc. is the leading provider of real-time, continuous web application integrity and security that protects sensitive web-based information. Breach Security's products protect web applications from hacking attacks and data leakage, and ensure applications operate as intended. The company's products are trusted by thousands of organizations around the world, including leaders in finance, healthcare, ecommerce, travel, and government.
Breach Security,application firewall,application layer firewall,firewall application,web application firewall,waf,webdefend,sql injection,scraping,web application attacks,web application threat,cross site scripting,web application integrity,web application security,remediate code errors,data leakage,application defect,phishing,leeching,continuous web application security,white paper,webinar,case study,security of data,application security application,protect web application,security breach,application security tool,PCI,PCI 6.6,PCI DSS,security,modsecurity,pci compliance,protect card-holder,payment card industry,compliance report,pci rule sets,identify security defects,web application policy-setting,virtual patch,pci compliance for web applications
Core Security
Core Security Technologies is the leader in comprehensive security testing software solutions that IT executives rely on to expose vulnerabilities, measure operational risk, and assure security effectiveness. The company’s CORE IMPACT product family offers a comprehensive approach to assessing the security of network systems, endpoint systems, email users and web applications against complex threats. All CORE IMPACT security testing solutions are backed by trusted vulnerability research and leading-edge threat expertise from the company’s Security Consulting Services, CoreLabs and Engineering groups.
security test, penetration testing, pen testing, 503-A, exploit, ethical hacking, security testing software, core impact, security testing application, vulnerability scanning, vulnerability, core, core security, security test, PCI, NIST, HIPPA, SOX, GLBA
Help Booth
Help Desk Visit the help desk for real-time assistance in the virtual event.
help, support, technical
InformationWeek-Dark Reading
The editors of Dark Reading and InformationWeek welcome you to Risk, Protection, and Access: Mastering Today's Security Threats! Visit our booth to view the latest information on security management, attacks and breaches from InformationWeek, read up-to-the-minute news and watch DR TV from Dark Reading, share your opinions in Blog Central, invite your friends and colleagues, and complete our feedback survey!
Dark Reading, InformationWeek, Techweb, UBM, United Business Media, Virtual Events, network, security, resources, literature, articles
NitroSecurity
NitroSecurity is the leading supplier of network and information security products that protect business information and infrastructure — Edge-to-Core. NitroSecurity solutions reduce business risk exposure and increase network and information availability by monitoring, protecting and alerting organizations about suspicious or harmful network activities from inside or outside the enterprise. Utilizing the industry's fastest analytical tools, NitroSecurity will identify, correlate and remediate threats in minutes instead of hours, allowing organizations to quickly mitigate risks to the organization's information and infrastructure.
NitroSecurity,SIEM,SIM,SEM,Log Management,Log Collection,Log Analysis,Information Security,Network Security,Intrusion,IDS,IPS,IDP,Intrusion Detection,Intrusion Prevention,Database,database monitoring,database activity monitoring,security information management,security event management,security event,data security,database security
Prize Center
Proofpoint
Proofpoint’s unified email security and data loss prevention platform provides comprehensive protection against both inbound threats and outbound content security risks— and Proofpoint’s modular architecture lets you easily deploy new defenses as your needs change. Visit our booth to learn more.
Proofpoint, unified email security, data, loss, prevention, protection, inbound threats, outbound content, security, risks
Sunbelt Software
Sunbelt Software is a leading provider of Windows security software with solutions in the areas of antispam, antivirus, and antispyware. Leading products include VIPRE Enterprise, Sunbelt CWSandbox, and Ninja Email Security. Check out our booth and be entered to win a $100 AMEX Gift Card!
Sunbelt Software, Virus Protection, Windows Security, Antivirus, Email Security, VIPRE, CWSandbox, malware protection, network security, windows system management, spyware protection, anti-malware
Symantec
Symantec -- Confidence in a Connected World --
Symantec, security, webcast, solutions, connect
TechWeb Lounge
Thawte
Welcome to the thawte booth. For over 12 years we have delivered a wide range of value for money SSL and code signing digital certificate solutions – all backed with consistently reliable technical support. Here you will find a range of our product and technical guides which will provide you with an understanding of SSL and practical assistance in implementing our certificates on popular web servers. Be sure to download our guide to Extended Validation – the new standard in SSL.
Thawte
Webroot - Email and Web Security Software as a Service
Webroot
Webroot provides industry-leading web and e-mail security solutions to consumers and businesses across the world. The company’s newest offering, software-as-a-service (SaaS), eliminates the need for companies to invest in and maintain their own security hardware and software. Instead, Webroot provides award-winning protection in the cloud, allowing both on-site and remote users to stay protected. Webroot E-Mail Security SaaS blocks spam and viruses and allows for content filtering, encryption, archiving and more. Webroot Web Security SaaS provides proactive protection against viruses, spyware and inappropriate online usage.
Webroot, SaaS, security, software as a service, email security, web security, desktop security, network security, perimeter, malware, spyware, viruses, protection, spam, antispam, antispyware, antivirus, URL filtering, web filtering, threat protection, EMS, email systems, appliances, software, saas, SMB, enterprise, archiving, business continuity, disaster recovery, content control, image scanning, reporting, porn filtering, internet security, spy sweeper, privacy, spam blocking, DDOS, DHA, backscatter, mobile protection,
About Sunbelt Who We Are and What We Do
http://www.sunbeltsoftware.com/About/
0
Achieving PCI Compliance
NitroSecurity_PCI_Compliance.pdf
7
Alarming Shift in Cybercrime What makes a website "safe"?
BlueCoat_Cybercrime_Shift_wp_v2d.pdf
7
AntiFraud Accelerator Product Brief
AntiFraud_Accelerator_SVB.pdf
5
Application Delivery Networks The new imperative for IT Visibiity, Acceleration and Security
BlueCoat_Application_Delivery_Networks_wp_v1a[1].pdf
7
ArcSight Logger and PCI DSS 1.2 whitepaper
Logger_PCIDSS_WP.pdf
7
ArcSight Logger Compliance Package for SOX Log management solution
ArcSight_Logger_Compliance_Package_for_SOX.pdf
5
ArcSight Logger Product Brief Log Management Solution
ArcSight_Logger.pdf
5
Automated Malware Analysis with Sunbelt CWSandbox: Sunbelt CWSandbox provides fast analysis of virus, spyware, trojan, or other malware samples. Upload malware samples to analyze and get results back by email. CWSandbox enables the automatic collection of malware from different inputs including Nepenthes, a web server/interface, or a directory. In short: Powerful Automated Malware Analysis.
http://www.sunbeltsoftware.com/Developer/Sunbelt-CWSandbox/
5
Aware Database Activity Monitoring
Content_Aware_Database_Activity_Monitoring.pdf
7
Best Practices for Controlling Skype in the Enterprise Due to its stealthy nature Skype presents security and compliance problems in the enterprise
BCS_controlling_skype_wp.pdf
7
Blue Coat ProxyClient Learn How to Protect Remote Users
BC_ds_ProxyClient_v2h.pdf
5
Blue Coat WebFilter Content Filtering with Blue Coat's WebFilter
bcs_ds_bcwf_v1-1[1].pdf
5
Blue Coat WebFilter Technology A dynamic content filtering solution that performs effective policy enforcement and gateway security role
BlueCoat_BCWF_wp_v3b_503[1].pdf
7
Care New England
Care_New_England.pdf
3
Certify your Software Integrity with thawte Code Signing Certificates This guide will show you how Code Signing Certificates are used to secure code that can be downloaded from the Internet. You will also learn how these certificates operate with different software platforms.
codesigning_eng.pdf
7
Changing the Game: The New Security Threats Facing Your Organization (White Paper)
WP_Changing_the_Game.pdf
7
CORE IMPACT and the PCI Standard
PCI.pdf
5
CORE IMPACT Endpoint Security Testing
Endpoint.pdf
5
CORE IMPACT Essential Overview
Essential_Overview.pdf
5
CORE IMPACT Pro Network Overview
Network.pdf
5
CORE IMPACT Pro Overview
CoreOverview.pdf
5
CORE IMPACT PRO WebApplication Overview
WebApp.pdf
5
Dallas Community College SaaS Case Study
Webroot_DCCCD_CaseStudy_Email.pdf
3
Data-Centric Security for Enterprise WANs Protect your valuable data, whether to comply with industry regulations or to guard intellectual capital
bcs_wp_dlp._v1.pdf
7
Datasheet: Proofpoint Content Compliance
DS-Proofpoint-Content-Compliance.pdf
7
Datasheet: Proofpoint Digital Asset Security
DS-Proofpoint-Digital-Asset-Security.pdf
7
Datasheet: Proofpoint Dynamic Reputation & netMLX
DS-Proofpoint-Dynamic-Reputation.pdf
7
Datasheet: Proofpoint Email Archiving
DS-Proofpoint-Email-Archiving.pdf
7
Datasheet: Proofpoint Messaging Security Gateway Appliance, Virtual Edition Appliance and Proofpoint Protection Server Software
DS-Proofpoint-Messaging-Security-Gateway-and-Proofpoint-Protection-Server.pdf
7
Datasheet: Proofpoint Network Content Sentry
DS-Proofpoint-Network-Content-Sentry.pdf
3
Datasheet: Proofpoint on Demand Hosted Service
DS-Proofpoint-on-Demand.pdf
7
Datasheet: Proofpoint Regulatory Compliance
DS-Proofpoint-Regulatory-Compliance.pdf
7
Datasheet: Proofpoint Secure File Transfer
DS-Proofpoint-Secure-File-Transfer.pdf
3
Datasheet: Proofpoint Secure Messaging
DS-Proofpoint-Secure-Messaging.pdf
3
Datasheet: Proofpoint Smart Search Appliance
DS-Proofpoint-Smart-Search.pdf
0
Datasheet: Proofpoint Spam Detection
DS-Proofpoint-Spam-Detection.pdf
7
Datasheet: Proofpoint Virus Protection
DS-Proofpoint-Virus-Protection.pdf
7
Datasheet: Proofpoint Zero-Hour Anti-Virus
DS-Proofpoint-Zero-Hour-Anti-Virus.pdf
7
eBook: Modern Malware Threats and Countermeasures: This RealTimePublishers eBook will give you information on the latest malware threats from adware and keyloggers as well as a detailed look at the tools and techniques for eliminating malware.
Sunbelt_Software_ModernMalwareThreatsandCountermeasures.pdf
7
EFG Bank Customer Case Study Log Management customer case study
ArcSight_CS_EFG_FINALE.pdf
0
Enterprise Application Delivery - No User Left Behind Deliver secure applications to all users, using any device, across any network
BlueCoat_EntAppDel_wp_v2-4[1].pdf
7
Extended Validation SSL Certificates Extended Validation SSL delivers the acknowledged industry standard for the highest level of online identity assurance processes for SSL certificate issuance. Find out how the EV standard increases the visibility of authentication status through the use of a green address bar in the latest high security web browsers.
ev_eng.pdf
7
First State Bank
First_State.pdf
3
Fiserv Customer Case Study Customer case study on Log Management
ArcSight_CS_Fiserv_FINAL.pdf
0
Garter Magic Quadrant for Secure Web Gateway, 2008 The Gartner Secure Web Gateway Magic Quadrant positions vendors based on their ability to execute and completeness of vision. Based on these criteria, Blue Coat is positioned in the leader's quadrant.
Blue_Coat_Systems_2860.pdf
3
Gartner
Gartner.pdf
7
Gartner Security Podcast Gartner Security and Privacy analyst, Peter Firstbrook, advises enterprises on the changing nature of the threat landscape
BlueCoat.mp3
4
General Dynamics Case Study Customer case study on Log Management
ArcSight_CS_GeneralDynamics_FINAL.pdf
0
Guide to PCI Compliance for Web Applications (White Paper)
WP_PCIComplianceGuide_FINAL_092408.pdf
7
Guide to PCI Compliance v1.2 (Webinar On-Demand)
https://breachsecurity.webex.com/breachsecurity/ldr.php?AT=pb&SP=MC&rID=27552682&rKey=A1BEEA9589279E6D
0
High Performance, Next Generation Antivirus + Antispyware for the Enterprise: Starting with a blank slate, Sunbelt designed VIPRE Enterprise to incorporate the best ideas for dealing with the new generation of malware threats in the most comprehensive, highly efficient manner. The result is a clean, fast, and powerful anti-malware solution.
vipre-enterprise-datasheet.pdf
2
How to Protect Business from Malware SaaS White Paper
Layered_Security_for_Email_and_Web.pdf
7
How to Secure and Accelerate Your Oracle Applications Secure and optimize your application performance
THINKstrategies_BlueCoat_Oracle_WP_v04_08_Final.pdf
7
IdentityView Product Brief Enhancing the Value of Identity Management
IdentityView_PB_FINAL.pdf
5
IPS Solution for the DNS "Kaminsky" Vulnerability
NitroSecuritys_Kaminsky_DNS_Solution.pdf
7
JSC Norvik Banka (Case Study)
CS_JSCNorvikBanka_Final_070108.pdf
0
Lastminute.com
LastMinute.com.pdf
3
Malware Defenses Podcast The cybercrime world has turned the web into a computing grid with tremendous power to take advantage of vulnerabilities
Malware_Defenses_podcast.mp3
4
Mitigating Fraudulent Transactions with SIEM Whitepaper addressing Fraud
Fraud_SIEM_WP_FINAL.pdf
7
ModSecurity Pro M1100 and PCI Compliance (White Paper)
DS_ModSecurityPro_M1100.pdf
3
More Customer Case Studies
http://www.arcsight.com/case_studies.htm
0
Mustang Controls Spyware at the Gateway Global engineering firm uses proxy appliances to cut costs and restore worker productivity
CaseStudy_Mustang.pdf
3
Open, Manage and Accelerate SSL Encrypted Applications Balance security, privacy and performance for encrypted applications
BlueCoat_SSL_Accel_wp_v3d.pdf
7
Osterman Research: Protecting Against the New Wave of Malware: This white paper examines why older, traditional antivirus approaches don't work and why a new approach to endpoint security is required to better protection. Learn about the scope of the malware problem strategies that can help you defend against evolving malware threats.
Protecting_Against_the_New_Wave_of_Malware_September_2008.pdf
7
Overstock.com (Case Study)
CS_Overstock_Final_090908.pdf
3
Priority Health Customer Case Study Healthcare customer case study
Priority_Health.pdf
0
Product Overview Brochure Description of Blue Coat products
BC_ProductOverview_v2c[1].pdf
5
Products and Solutions Information Solutions and products for Log Management, Event Collections & Management, Compliance Automation and Identity Management
http://www.arcsight.com/product_overview.htm
5
ProxyClient Podcast Client software that accelerates application performance, extends URL filtering benefits to remote users and gives LAN-like performance in any location.
ProxyClient.FINAL.mp3
4
Register Here To Win Gift Card Sign
flyer_win_amex_giftcard_(2).pdf
1
ROI
Rise_of_Sec._testing.pdf
7
ROI2
ROI.pdf
7
Securing your Apache Web Server with a thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure.
apache_eng.pdf
3
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.
iis_eng.pdf
3
Securing your Online Data Transfer with SSL A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe.
ssl_eng.pdf
7
Sequoia Retail Systems, Inc. (Case Study)
CS_SovereignBank_Final_070108.pdf
0
Server-Gated Cryptography Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.
sgc_eng.pdf
7
SGOS Proxy Edition Description of Blue Coat SGOS
bcs_ds_sgos-proxy_v2c.pdf
5
State of Alabama Picks Blue Coat Proxy Appliances to Protect Web Infrastructure State government finds ideal solution for letting in good content and keeping out bad content
CaseStudy_Alabama[1].pdf
3
State Of Internet Security Report - Protecting Business Email
SOIS_Protecting_Business_Email.pdf
7
State Of Internet Security: Protecting Business Email
WR_SOIS_Email_FINAL.pdf
7
State of Internet Security: Protecting the Perimeter
SoIS_Protecting_Perimeter.pdf
7
Stephen S. Wise Template (Case Study)
CS_StephenSWise_Final_070118.pdf
3
Stevens Aviation SaaS Case Study
Webroot_StevensAviation_CaseStudy_Email.pdf
3
Sunbelt Customers and Partners: At Sunbelt Software we know that partnerships are critical to the success of our customers. Sunbelt Software is focused on working with well-established, best-in-class companies to add value to their offerings and to enhance our technology and products.
Sunbelt_Customers_and_Partners.ppt
6
Sunbelt CWSandbox Feature Checklist: If you're in the process of evaluating solutions for automated malware analysis, make sure you cover all the bases. To help you in the evaluation process, we've provided this checklist of all the key functions any malware analysis product should provide.
sunbelt-cwsandbox-feature-checklist.pdf
0
Sunbelt CWSandbox Request More Information: For more information on how you can leverage the Sunbelt CWSandbox technology for your organization's research efforts, please contact Sunbelt Business Development via this form or call 888-688-8457 ext 274.
http://www.sunbeltsoftware.com/Developer/Sunbelt-CWSandbox/?tab=5
0
Teachers
Teachers.pdf
3
The Benefits of Unified Security Management
Benefits_Unified_Security_Mgmt.pdf
7
The Business Case for Web Application Firewalls (White Paper)
WP_BusinessCaseForWAF_FINAL_092408.pdf
7
The End of Antivirus as You Know It - Podcast: Listen to this podcast to learn about VIPRE Enterprise.
VIPRE_Enterprise_The_End_of_AntivirusPodcast.mp3
4
The End of Antivirus as You Know It: A First Look at VIPRE Enterprise: Sunbelt Software introduces VIPRE Enterprise a completely new solution that combines antivirus, antispyware, anti-rootkit and other technologies into a seamless, tightly-integrated product.
VIPRE_Enteprise_-_The_End_of_Antivirus_as_You_Know_It.wmv
6
The Fundamental Requirements of SIEM
Fundamental_Requirements_of_SIEM.pdf
7
The Starter PKI Program This guide will introduce you to our Starter PKI Program, explaining how it works as well as the benefits it offers. We?2019ll also point you to a dummy company on our Web site where you can ?201Ctest drive?201D the Program.
spki_eng.pdf
7
The Strategic Value of Log Management
nitrosecurity_log_management_whitepaper.pdf
7
Threat Track Data Feeds: Sunbelt Software provides to technology and business partners a comprehensive array of data feeds from our Threat Center. These Threat Track data feeds can be a valuable enhancement to your own resources for analyzing, blocking and remediating malware threats.
Sunbelt-CWSandbox-Data-Feeds.pdf
5
Top 10 Reasons Hackers use the Web for Attacks
bcs_sg_top10hackers.pdf
1
Top 10 Security Threats
bcs_sb_top10sec2008_v1-1.pdf
1
Top 10 Ways to Protect Against Web Threats
bcs_sb_top10protect.pdf
1
Top 5 Myths of Direct to Net
bcs_sb_D2N_top5myths.pdf
1
Top 5 Reasons Why Application Performance and Network Security Go Together
bcs_sb_top5.pdf
1
University of Tennesee Case Study Customer case study on Log Management
ArcSight_CS_UnivTennessee_FINALE.pdf
0
VIPRE Enterprise 30-day Evaluation: Test-drive VIPRE Enterprise and see how antivirus, antispyware, anti-rootkit and other technologies are combined into a single agent handled through a robust central management console.
http://go.sunbeltsoftware.com/?linkid=401
5
VIPRE Enterprise Microsite: Learn more about VIPRE's features and benefits.
http://www.vipreenterprise.com
5
VIPRE's performance metrics compared to other products.
http://www.sunbeltsoftware.com/documents/vipre-enterprise-performance-metrics.pdf
5
Virginia Tech
VA_Tech.pdf
3
Visibility and Control with Proxy Appliances Gain visibility and control of user communications over the Web
BCS_Control_WebComm_wp.pdf
7
Watson Goepel Maledy SaaS Case Study
Webroot_WatsonGoepel_CaseStudy_Email.pdf
3
Web Application Integrity Series: SQL Injection (Webinar On-Demand)
https://breachsecurity.webex.com/breachsecurity/ldr.php?AT=pb&SP=MC&rID=26598777&rKey=19DCAB6CD77B4BE8
0
Web Applications and How They Have Changed the Game (Webinar On-Demand)
https://breachsecurity.webex.com/breachsecurity/ldr.php?AT=pb&SP=MC&rID=26572922&rKey=E46A5F2CFD509B58
0
Webcast: Automating Malware Analysis - Keeping Ahead of the New Wave of Malware: Register for this CWSandbox webcast scheduled for Wednesday, November 5th, 2008
http://www.sunbeltsoftware.com/Developer/Sunbelt-CWSandbox/vts/
0
WebDefend and PCI Compliance
DS_WebDefendPCI_FINAL_081208.pdf
3
Webroot E-Mail Security SaaS - Anti-Spam Data Sheet
Webroot_Antispam_Email.pdf
2
Webroot E-Mail Security SaaS - Business Continuity Data Sheet
Webroot_BizContinuity_Email.pdf
2
Webroot E-Mail Security SaaS - Deep Content Scanning Data Sheet
Webroot_DeepContentScanning_Email.pdf
2
Webroot E-Mail Security SaaS - Overview Brochure
Webroot_Overview_Email.pdf
1
Webroot E-Mail Security SaaS - Service Reporting Management Data Sheet
Webroot_DeepContentScanning_Email.pdf
2
Webroot Security SaaS - Archiving Overview White Paper
Webroot_Archiving_Overview_WP.pdf
7
Webroot Web Security SaaS - Overview Brochure
Webroot_Overview_Web_USA[1].pdf
1
Webroot Web Security SaaS: The Next Generation of Web Security IDC Whitepaper
Webroot_WebSaaS_IDCWhitePaper.pdf
7
Whitepaper: Increasing Security and Compliance with a 360-Degree View of User Activity Identity Monitoring whitepaper
IdentityView_whitepaper_web_final.pdf
7
Whitepaper: A Modern Approach to On-Demand Email and Data Security
WP-Proofpoint-Modern-Approach-to-On-Demand-Email-Security.pdf
7
Why Security SaaS Makes Sense Today Whitepaper
WhySecuritySaaSMakesSenseToday_Webroot.pdf
7
Why Security Shouldn't Take a Back Seat to PCI (Webinar On-Demand)
https://breachsecurity.webex.com/breachsecurity/ldr.php?AT=pb&SP=MC&rID=26258692&rKey=DD3F7FE19CE21CDF
0
Attendee Registration
Blog Space
InformationWeek and Dark Reading
Cell Phone New Cybercrime Frontline
Whether it's your iPhone, Windows Mobile device, Android, or BlackBerry -- you're probably using your smartphone more like a computer more and more. That's great, but the more your phone acts like a PC -- the more likely all of the problems associated wit
Posted by George Hulme, Oct 15, 2008 04:48 PM

Whether it's your iPhone, Windows Mobile device, Android, or BlackBerry -- you're probably using your smartphone more like a computer more and more. That's great, but the more your phone acts like a PC -- the more likely all of the problems associated with PCs will follow, researchers said today. Should you care?

We've been warning about the security of mobile devices for years, and years, and years. I've written so many stories about the security risks of mobile phones that I'm starting to feel like Chicken Little. So far, we've not seen a major virus or malware event. That doesn't mean it's not going to happen. The infamous Morris worm hit in 1988 -- and we didn't see a similar event at any time in the 1990s. Viruses were a problem, but they didn't become a really big humungo problem until the LoveBug overloaded e-mail servers in the spring of 2000.

These things don't always happen when we first expect them. But we can see the trend lines: more criminals are turning to cybercrime to steal, snoop, and destroy; and smartphones are growing exponentially in processing and storage power. We're also starting to see smartphones with more open, generative platforms, such as Google's Android.

It's a safe bet to predict these two trend lines will cross, and criminals will turn to mobile phones to conduct all of the types of crimes they do on PCs and the Internet today. Predicting exactly when this will happen: not so easy.

Researchers contributing to Georgia Tech's Emerging Cyber Threats Report for 2009: Data, Mobility, and Questions of Responsibility Will Drive Cyber Threats in 2009 And Beyond, see the risks.

The comments below, from the report, are from Patrick Traynor assistant professor at the School of Computer Science at Georgia Tech:


According to Traynor, "malware will be injected onto cell phones to turn them into bots. Large cellular botnets could then be used to perpetrate a DoS attack against the core of the cellular network. But because the mobile communications field is evolving so quickly, it presents a unique opportunity to design security properly -- an opportunity we missed with the PC."

 

Traynor pointed out that most people buy a new mobile device every two years -- a much shorter life cycle than the typical PC and Windows installation, which is closer to 10 years.

"The short life cycle of mobile devices gives manufacturers, developers, and the security community an opportunity to learn what works from a security standpoint and apply it to devices and applications more quickly," said Traynor. "However, it is not going to be an easy problem to solve."

 

Tom Cross, X-Force Researcher with IBM Internet Security Systems, along with Traynor, cites Google's Android -- because of it's openness, it makes it easier for security vendors to build defenses for the device. On that, I agree. However, it also makes it much easier for malware authors, as well. Which means we'll be in the same PC security arms race we've experienced for more than 20 years now.

The ultimate solution is what both Traynor and Cross stated in their closing thought: a layered approach to security on mobile devices that encompasses carriers, manufacturers, and application developers.

That type of industry security synergy is exactly the best shot we have at ensuring smart phones don't become the battleground we're now fighting on PCs and corporate networks.

It's also expensive and difficult to get all of these constituents to work so closely together.

It may happen. But my prediction is that it's going to take a significantly enough nasty event for the industry to come together that tightly over security concerns.

Check out the Georgia Tech's Emerging Cyber Threats Report for 2009, available here.


Hezbollah Has Hacking Chops
Michael Chertoff, Homeland Security secretary, recently stated that Hezbollah is the greatest threat to U.S. national security. And Western intelligence agencies are increasingly taking the organization's cyberattack skills more seriously. What do you thi

Posted by George Hulme, Jun 3, 2008 08:36 PM

 

The topic of cyberwarfare reared its head again in this DefenseTech.org post. There's been talk about cyberwar for quite some time. Kevin Coleman writes that a 2002 CIA report noted that several groups were beginning to plan attacks on Western networks. I wrote this cover story about cyberwarfare on the eve of the Iraqi war.

Today, Coleman cites a number of estimated Hezbollah capabilities:

Equipment: Hezbollah possesses up-to-date information technologies -- broadband wireless networks and computers.

Cyber Capabilities: Global Rating in Cyber Capabilities -- Tied at Number 37
Hezbollah has been able to engage in fiber optic cable tapping, enabling data interception and the hijacking of Internet and communication connections.

Cyber Warfare Budget: $935,000 USD

Offensive Cyber Capabilities: 3.1 (1 = Low, 3 = Moderate and 5 = Significant)

Cyber Weapons Rating: Basic -- but developing intermediate capabilities

 

The post goes on:

Using new hacking techniques, taking advantage of security vulnerabilities, and using simple, proven cyberattack methods, terrorists have the capability to attack us in ways not seen before. Key infrastructure systems that include utilities, banking, media/TV systems, telecommunications, and air traffic control systems have already been compromised. No one knows if cyber terrorists created trap doors and left logic bombs allowing them to easily bypass security systems and disrupt our critical infrastructure in coordination with traditional style attacks.

The notion that cyberterrorists have created trap doors, or left logic bombs behind in previous attacks, strikes me as a bit far-fetched. It's possible, and the recent alarm from the FBI about counterfeit Cisco (NSDQ: CSCO) routers is cause for concern. But IT systems change fairly quickly, and the utility of such digital plants wouldn't have a long shelf life, and couldn't be guaranteed to work when needed. I'm not sure what the "new" hacking techniques would be.

However, there's no doubt in my mind that cyberattacks against Western interests are going to supplement traditional warfare. They'll be used to attempt to disrupt financial networks, emergency responders, power, and other fundamental aspects of society.

The good news is that there's no secret nation-state or terrorist attack kit. I'm not aware of any super-duper denial-of-service attack capabilities that have yet to be unleashed. These attacks, if they happen at all, will most likely resemble the attacks against unpatched systems, or social engineering a user to somehow provide access. The odds of sustaining such an attack are in your favor, if you build a resilient architecture, with good security, risk management, and business-continuity procedures in place. In fact, any such attacks should be far less disruptive than the possible hacks, hurricanes, tornadoes, fires, or any other natural disaster you're already planning for.

The takeaway: If you're prepared for a sizable natural disaster, and already hardening your systems, you're as covered as you can be.


New Calif. State Legislation Threatens S
Two new state medical privacy laws, AB211 and SB541, make it possible for institutions and individuals to be fined up to $250,000 for being lax when it comes to the medical privacy of California residents. It's about time.

Posted by George Hulme, Oct 18, 2008 02:32 PM

Two new state medical privacy laws, AB211 and SB541, make it possible for institutions and individuals to be fined up to $250,000 for being lax when it comes to the medical privacy of California residents. It's about time.

The fines can't roll enough as far as I'm concerned.

From this story, which originally appeared in the AIS's Health Business Daily:

Hospitals and other covered entities in California may have to beef up their privacy and security compliance programs in light of recently enacted state legislation that slaps stiffer penalties on entities and employees who violate patient privacy. The legislation, approved in mid-September and signed by Gov. Arnold Schwarzenegger (R) on Sept. 29, follows privacy breaches of several high-profile celebrities, including singer Britney Spears and California First Lady Maria Shriver.

We covered the Britney Spears UCLA fiasco when that story broke, and I delivered an overview of these two new California laws on my other blog at TransformationEnablers.com.

In a nutshell, AB211 requires health care providers to take appropriate safeguards to protect patient medical information, while SB541 sees that those in violation could be penalized $100 a day, up to $250,000.

Some say that these security requirements aren't necessary, because we already have HIPAA. This quote is from the same story as above:

"There is an argument to be made that a law like this isn't absolutely necessary, because certainly HIPAA required reasonable safeguards of patient information or protected health information," says Reece Hirsch, a partner in Sonnenschein Nath & Rosenthal's San Francisco office.
Still, the California legislation is significant in some respects, he tells RPP. It takes data-security concepts found in federal law and applies them at the state-law level, he says.
"Perhaps most significantly, it also attaches a whole new regime of fines and penalties related to violations of those standards," Hirsch adds. "Some people might say the HIPAA privacy and security rule has not been very vigorously enforced thus far by HHS. This sort of provides a basis for state authorities to impose some fairly significant penalties when there is a perceived privacy or security breach."

I say the stronger argument is that HIPAA has not been vigorously enforced, and it's about time a state has stood up to do so.

California set the precedent with SB 1386, and the state is about to do it again.


New DOS Attack Is a Killer
Virtual event speaker RSnake offers insights on new attack
Things are a-brewin’ in Sweden.  Sweden is not just home of the infamous bikini team, it is also the home of Outpost 24, an equally sexy software-as-a-service network scanning service, and the employer of my friend Robert E. Lee and his colleague Jack C. Louis.  These guys are the inventors of UnicornScan, a user-land TCP stack turned into a port scanner.  Never heard of it?  Use Nmap exclusively?  Well if you run Linux, I suggest checking ithttp://blog.robertlee.name/2008/01/port-scanner-challenge-revisited-nmap.html"target="new">it> out, especially if missed ports in your portscan is inexcusable. But I digress.

Robert and Jack are smart dudes.  I've known them for years, and they've always been one step ahead of the game.  A couple of years ago, Jack found some anomalies in which machines would stop working in some very specific circumstances while being scanned.  A few experiments, tons of reading through documentation, and one mysteriously named tool called "sockstress" later, and the two are now touting a nearly universal denial-of-service (DoS) attack that can be performed on almost any normal broadband Internet connection -- in just a few seconds.


How bad is it?  Well, in an">http://debeveiligingsupdate.nl/audio/bevupd_0003.mp3"target="new">an interview --- (fast-forward five minutes in to hear it in English), the two were asked if they could take out a data center.  While they've never tried, it appears to be a totally plausible attack.  Worse yet, unlike most DoS attacks, the machines often do not come back online once the attack is over.  The victim system just doesn’t respond any more.  Great, huh?


Robert and I talk a lot, and I asked him if he'd be willing to DoS us, and he flatly said, "Unfortunately, it may affect other devices between here and there so it's not really a good idea."  Got an idea of what we're talking about now?  This appears not to be a single bug, but in fact at least five, and maybe as many as 30 different potential problems.  They just haven't dug far enough into it to really know how bad it can get.  The results range from complete shutdown of the vulnerable machine, to dropping legitimate traffic.


The two researchers have already contacted multiple vendors since the beginning of September (I've had a small hand in getting them in contact with one of the vendors). Robert and Jack are waiting with no specific timeline to hear back from the affected TCP stack vendors. Think firewalls, OSes, Web-enabled devices, and so on. Yup, they'll all need to be hardened, if the vendors can come up with a good solution to the problem.  IPv6 services appear to be more affected by the fact that they require more resources and are no more secure since they still reside on top of an unhardened TCP stack.


Jack and Robert are both trying to be as forthcoming as possible with the affected vendors without giving any specific information on how the attack works to the public at large -- openly acknowledging how dangerous the attack really is.  Their hope is that the vendors appreciate the problem and come up with fixes that may not be initially obvious to them.  I asked Robert when they planned to release their tool, to which he said he wasn't sure he would "ever release sockstress."  The details, however, will be forthcoming once vendor patches are available.  There are no mitigating short-term fixes, folks.

I feel winter slowly coming, and it would be a shame if entire power grids could be taken offline with a few keystrokes, or if supply chains could be interrupted.  I hear it gets awfully cold in Scandinavia.

— RSnake will be speaking at Thursday's security virtual event. His rants can also be found at ha.ckershttp://ha.ckers.org"target="new">Ha.ckers> and F*the.nethttp://www.fthe.net/"target="new">F*the.net>.


Security's Virtual Get-Together
Virtual event opens new avenues for exchange of information

Getting there is half the fun! I don't know what bozo coined this chipper little phrase, but I'm pretty sure they had never been to an IT tradeshow.


Going to trade events -- even the really good ones like RSA and Black Hat -- is a pain in the neck. It means getting approval for the travel, booking airline reservations, and being herded like cattle through registration lines. It means mass-produced meals and working in your hotel room to make up for the time you missed. And if you're a security pro, it means being off-site when the next big attack hits.


But what if you could go to a tradeshow online, without leaving your desk? We're not talking about a webinar here. I mean a real trade event, with an exhibit floor, keynote speeches, drill-down presentations, and opportunities to chat with speakers, exhibitors, and fellow attendees. Better yet, what if that online conference was free?

I hate to sound like a late-night pitchman, but that event is taking place next Thursday, Oct. 23, and you're invited. "Risk">https://www.techwebonlineevents.com/ars/eventregistration.do?mode=eventreg&F=1001194&K=4IK"target="new">Risk, Protection, and Access: Mastering Today's Security Threats" is the first-ever virtual conference co-produced by Dark Reading and our big sister publication, InformationWeek. Check out the video:

http://www.youtube.com/v/dZps-bm0TCw&hl=en&fs=1">

name="allowFullScreen" value="true">
http://www.youtube.com/v/dZps-bm0TCw&hl=en&fs=1" type="application/x-shockwave-flash" allowfullscreen="true" width="425" height="344">


This all-day event is designed to allow you to see multimedia presentations by the big names in the industry -- including superhacker Kevin Mitnick and Metasploit founder HD Moore -- without getting up from your office chair. You can watch them live, or you can catch recordings when you have available time.


Just as importantly, you can also do the other things you'd do at an industry conference. You can go into an exhibit booth and kick the tires on the latest security products. You can ask questions of the speakers after a session. You can even congregate with experts and other security pros in a virtual lounge. The only thing you'll be missing is the bag of free plastic items you normally pick up from the exhibit booths -- we'll have to work on that for the next virtual event.


Take a look at the speakers">http://i.cmpnet.com/audiencedevelopment/EJ/IK_DR_SECURITY_102308/SPEAKERS_TAB.html"target="new">speakers we've lined up for the event. You'll see many names you recognize, including Robert "RSnake" Hansen, who's been at the center of two of the biggest vulnerabilities disclosed in recent weeks. (See {doclink 165431} and {doclink 165618}.) The speakers will be talking about problems you're dealing with today, including social engineering, tough-to-tackle vulnerabilities, and the potential fallout of cyberwar.


If I sound overly enthusiastic about this event, it's because I am. Events like this could open up new avenues for security education and debate, because they eliminate the high hurdles of long airline flights and pesky expense reports. If we can get people talking without forcing them to leave their desks, then we might have a shot at speeding up the process of finding solutions to security problems.

 


"Getting there" isn't half the fun. But if I'm already there when I'm at my desk, the next security trade conference may suddenly become half the pain in the neck.

 


— Tim Wilson, Site Editor, dark/">http://www.darkreading.com">Dark Reading


Looking forward to hearing RSnake speak!
Security Resources