This week is the third annual OSSEC week! A good initiative to promote this open source log management solution. This post is my first contribution to the OSSEC community, I hope to publish more posts if I’ve enough time. OSSEC is a excellent tool to collect and analyze the events
Category: Security
Quick ISSA-Be Meeting Wrap-Up
Quick wrap-up about the last ISSA-Be chapter meeting… Wim Remes (@wimremes) was on stage to speak about visualization and his project to join the (ISC)² board. In our world (information security), we collect a lot of (technical) data. How to present them in an efficient way to manager or non-techies?
Use the Ports, Luke!
Last week, I went to London to attend the RSA Conference Europe (my wrap up is here). One of the sessions I followed was presented by Eric Vyncke about “forensics in a post IPv4 exhaustion“. You should live on another planet if you’re not aware of the coming IPv4 exhaustion.
RSA Conference Europe 2011 Wrap-Up
This is my wrap-up of the last RSA Conference which occurred in London. As usual, it’s a mix of t-shirts and ties. But, vendors followed the rules of the game and came with less promotional material for their next-top-ultra-last-generation-solution-to-beat-all-hackers-from-outer-space. As usual, the first half-day was dedicated to keynotes with great
Post #BruCON Network Analyzis
BruCON is over! As usual, when I attended a security conference, I’m trying to write a small wrap-up for me followers. With BruCON, it’s completely different: I’m on the other side of the stage. For the “0x03” edition, I was again involved in the “bits & bytes” stuff. I did
Hack.lu 2011 (Quick) Wrap Up
Here is my quick wrap up of my visit to hack.lu 2011. For those who do not know me, I’m a BruCON volunteer, busy with the network stuff. This year was very special, due to unforeseen circumstances, both conferences overlapped! BruCON (the talks) were scheduled Monday and Tuesday and Hack.lu
Last minute contest: 2 x free ticket to attend #BruCON
We are so close to the next edition of BruCON! The volunteers are doing their best and keep the pressure to make this event awesome! It’s not too late to register and I’ve a gift for my blog readers: 2 free tickets! (*). As a sponsor, my employer received tickets
From Logs to Hell!
I have hesitated a while before choosing the right image to illustrate this article. I read again a press-release about a new log-management product which pretends to provide “out-of-the-box security and compliance for business of all sizes“. Dear v€ndor, are you living in a care bears world or are you
Your Car Knows a Lot About You!
I got a new company car. W00t! After the basic welcome-tour of the different options, I went deeper and reviewed the on-board computer configuration options. Today, modern cars integrate multimedia interfaces to manage information from several sources: GPS coordinates (past as well as present) Phone books synchronized from phones over
Implementing Security Controls via Nagios
In my last post, I gave some inputs about the implementation of basic security. It can be increased by following simple rules and procedures. This was purely theoretical. So, I decided to continue on this topic and show you how basic security checks can be implemented without spending too much