The number of scheduled security events is gigantic! There are the “big ones” like DefCON, BlackHat or RSA. They are outsider but which promise to be very interesting (like BruCON, no advertisement to read here ;-)). There are also lot of local events like all the chapter of international organization
Security Awareness Book for our Children
It is never too early to give some security recommendations! My first daughter became a fan of a book series called “Max & Lili”. Those comics books (only available in French if I’m not wrong) are written by Serge Bloch and Dominique de Saint-Mars. Each volume focuses on a specific
Belgium Would Like to Track Your Emails for Two Years?
Mr Stefaan De Clerck , the Belgian Justice Minister announced a new plan to fight (cyber-)criminals. Belgian ISP’s could be asked forced to keep a trace of all communications via e-mail for two years. Read the article on the RTBF website in French (or via Google Translate). The main reason
And What About the Human Factor?
A few days ago, an article was posted on the (ISC)2 blog about the idea of a new CBK to cover “human factors” in security? (ISC)2 means (take a deep breath) “International Information Systems Security Certification Consortium“. This is a not-for-profit organization which maintains, amongst others, the CISSP certification.The current
Easy Geolocalization of IP Addresses
If there was only one annoying operation for me, it will be to search contact information about IP addresses! Often, network administrators and security guys have to found out to who is assigned a given IP address (example: when analysis logs or doing forensics searches). Useful information linked to IP
Side Effect of Swine Flu: Optimize Your Remote Access Solutions!
“Swine Flu”, what a hot topic! The disease continues to progress and infects more and more people every day. Medical experts estimate an exponential number of new cases due to the summer period: We travel more across countries for holidays and meet more people, increasing the risk to catch the
UNIX Turns 40!
The very first version of the UNIX operating system was born in Augustus 1969! Its early name was Multics (“Multiplexed Information and Computing Service“). Years after years new branches started to build a huge family of different operating systems, all of them descending from the same origin. It has always
Newton was not Security Aware
Isaac Newton was for sure a great physicianphysicist but he was not security aware! In his third law, he said “For every action, there is an equal and opposite reaction.” (also known as the “action – reaction” principle). This law of physic does not apply to security and more precisely
Don’t Forget Your Sysadmin!
Every last Friday of July, it’s sysadmin day! Enjoy your day Guys and don’t forget to keep your systems secure! Before going to party, patch your bind servers. Exploits are in the wild… Otherwise, you can still use the BOFH-excuse-generator!
This Message Will Self-destroy in 30″!
“Cloud computing”! This is a hot topic in IT security for a while. I won’t explain why security is so importing within the cloud. To have a good overview, I recommend to follow Craig Balding’s blog. For sure, you already have personal data stored on the web. You use webmail