Monday, March 16, 2009

Around The Horn vol.1,63

Alerts

CVE-2009-0582 (Natl. Vulnerability Database)

CVE-2008-4316 (Natl. Vulnerability Database)

Security News

Splunk on Competition in the Log Management Space

The main competitors Splunk faces are ArcSight, with its Logger product, and LogLogic, although we have found that customer attitudes toward log management (LM), ESIM and security event
management (SEM) – respectively, log aggregation and archival, correlation of archived and real-time logs to create events, and correlation of real-time events – have changed fairly dramatically over the past year. Customers are considering their stance toward LM/ESIM/SEM, wondering just how much correlation they need, how much archival and forensic analysis and how much blended realtime/archived correlation is necessary after all. We have seen sea changes in the industry, and it is a trend we will report on in further detail in Q1 2009. We also don't discount the competition (still) from home-built log management projects.

ESIM comes from CA Inc, Consul Risk Management (now owned by IBM), Novell, eIQnetworks, RSA, the security division of EMC, ExaProtect, Inspekt Security, Intellitactics, netForensics, NetIQ, NitroSecurity, OpenService, Prism Microsystems, Q1 Labs, Symantec and Tier-3. SEM comes from TriGeo Network Security, Cisco Systems, Check Point Software Technologies and Tenable Network Security. Log management comes from Alert Logic, LogLogic, LogRhythm, RSA, SenSage and, to an extent, products that are moving toward the related space of governance risk and compliance, including Archer Technologies, eIQNetworks, LogRhythm and others. Servicebased companies developing LM/ESIM/SEM content sources and customizing those products to work in harmony with enterprise data sources include Decurity and Vigilant.

Vulnerability Management Payoff Requires Road Map

Posted by InfoSec News on Mar 16

http://securitywatch.eweek.com/flaws/vulnerability_management_payoff_requires_roadmap.html

By Matthew Hines
eWEEK Security Watch
March 15, 2009

Vulnerability management may be the next big thing in terms of IT security strategy, but deriving the maximum value out of your efforts requires...

Re: BBC team exposes cyber crime risk

Posted by InfoSec News on Mar 16

Forwarded from: security curmudgeon <jericho (at) attrition.org>

: http://news.bbc.co.uk/2/hi/programmes/click_online/7932816.stm
:
: Software used to control thousands of home computers has been acquired
: online by the BBC as part of an investigation into global cyber crime.
:
:...

HITB2009 - Dubai: Conference Agenda amp Noteworthy Presentations

Posted by InfoSec News on Mar 16

Forwarded from: Praburaajan Selvarajan <prabu (at) hackinthebox.org>

The agenda for HITBSecConf2009 - Dubai is now online along with details
on both the conference keynote sessions. There are still another 4 more
weeks to grab your seats to the GCC's premier network security event!

...

Worldwide cybercrime police network grows

Posted by InfoSec News on Mar 16

http://www.networkworld.com/news/2009/031209-worldwide-cybercrime-police-network.html

By Jeremy Kirk
IDG News Service
03/12/2009

More countries are joining a network designed to quickly react to
cybercrime incidents around the world, a senior U.S. Federal Bureau of
Investigation official...

Contribute For Cyber Security Policy Of India

Posted by InfoSec News on Mar 16

http://www.mynews.in/fullstory.aspx?storyid=16483

By V.K.Singh
12/3/2009

National security and cyber security in India is passing through a bad
phase. The recent terrorist attacks have unambiguously proved the
deficiencies and weaknesses of Indian defence mechanisms. India failed
to...

Bribery case creates possible IT security nightmare in D.C.

Posted by InfoSec News on Mar 16

http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=security&articleId=9129663

By Patrick Thibodeau and Jaikumar Vijayan
March 13, 2009
Computerworld

After being arrested on bribery charges yesterday, the District of
Columbia's top information...

Re: Cybercrime-as-a-service takes off

Posted by InfoSec News on Mar 16

Forwarded from: Dave Dittrich <dittrich (at) u.washington.edu>

> http://www.itnews.com.au/News/98524,cybercrimeasaservice-takes-off.aspx
>
> By Ry Crozier
> ITNews
> 12 March 2009
>
> Malware writers that sell toolkits online for as little as $400 will
>...

Tips to Bring Twitter to the Enterprise

Firms are moving from using short messaging service with customers to putting the technology to work inside the company.

Putting Wikis to Work

The wiki may have a silly name, but it's a useful technology for collaborating with customers and employees.

Conficker.C primed for April Fool's activation

By jhruska@arstechnica.com (Joel Hruska) on Conficker.C

We've been tracking the Conficker worm since it launched itself into the wild last November; despite the best efforts of security officials worldwide, the worm still hasn't been completely crushed. The original flavor and its nastier follow-up (Conficker.A and Conficker.B) have been locked down, but the worm's creators have a third version (Conficker.C, naturally) prepared to hit the tubes come April 1. The new "C" twist won't have all of the tools "B" used to replicate, but it will be able to detect and kill certain system processes designed to find and remove it.

No comments:

Post a Comment

My Blog List