Infosec people must keep their knowledge at the highest level. New threads, new technologies arise all the time. If you don’t perform a continuous education, you’ll are dead, so simply! There are plenty of ways to keep learning: books, forums, podcasts. Those are based on self-learning. Trainings and security conferences
Category: Event
Keep Big Brother away from Your Privacy!
Tomorrow, Friday 28th (or today depending on your timezone) is the Data Privacy Day. Today’s technologies make our day so funny. Could you imagine going back to the eighties and live without Internet, mobile phones, GPS, social networks, credit cards? Funny but so easy to divert and abuse. All services
Use your Logs to Detect Fraud
I was invited by the ISSA Belgium chapter to talk last night about log management & SIEM (“Security Information and Event Management“). This is a very interesting topic but almost everything has been said (good as bad) on SIEM. I decided to innovate and to use some articles posted in
My Wish List for 2011
2010 is almost over and 2011 is already at our door! In a few days, a lot of us will (try to) detach from the regular business and go back to family and friends to spend good times. It’s time to make some planning, reserve enough off-days and setup my
OWASP BeNeLux Day 2010 Wrap Up
Yesterday, the three OWASP Benelux chapters organized together their annual OWASP BeNeLux day. This edition was held at the Fontys Hogeschool in Eindhoven (NL). First detail of this year, the weather conditions! After more than three hours of driving on snowy roads, I finally reached Eindhoven. Just in time for
My Invitation to PaulDotCom Security Weekly
What a good surprise! I’ve been invited to participate to the episode #221 “Special Thanksgiving” of PaulDotCom Security Weekly podcast next Tuesday between 20:00 – 22:00 (CET). If you are available, feel free to join us live on pauldotcom.com/live/! This will be my second participation to a podcast (the first
Hack.lu Day #3 Wrap-up
The third day is just over, I just arrived at home in Belgium. Let’s write a quick review! The day started with Tom Keetch who demonstrated how to escape the protected mode of IE8. The feature is available with Internet Explorer 7 and requires at least Vista. Unfortunately, nothing is
Hack.lu Day #2 Wrap-up
The second day is over! Here is my wrap-up. After some doses of caffeine, the day started with the “Red Team Testing” workshop by Chris Nickerson (@indi303). He explained a methodology to conduct penetration tests. Good examples are the ones of the Tiger Team. The goal is to revamp the
Hack.lu Day #1 Wrap-up
We are already in November, fall is back! This is also the sign of the new edition of hack.lu, a classic security conference organized in Luxembourg. The first day started with workshops. I attended the crypto analysis workshop prepared by Eric Filiol, an expert in this domain. Cryptography is certainly
Wall Of Shame: Pros & Cons
A “Wall of Shame” or “Wall of Sheep” is a real-time demonstration application which searches for non secured (read: sent in clear text) login/passwords sent through a network. One of the well-know wall of sheep is the one operated every year during the Defcon conference in Las Vegas. A few