vulnerability management

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. Matasano has a challenge for you. Find the problem with this C++ code.
    Matasano Security LLC - Chargen - A C++ Challenge
    Tags: ( challenge exploit )
  2. Trying to setup a lab environment for pen testing and general security learning efforts. Check out this authors efforts so far.
    Virtual lab machines << Infosanity's Blog
    Tags: ( lab )
  3. Trying to figure out which NSM product is the right one for you? Richard has some thoughts on how to do just that. No brands or vendors mentioned, just characteristics and platforms.
    TaoSecurity: NSM in Products
    Tags: ( nsm )
  4. Here is an interesting list you can compare your scanner, or the scanner you are evaluating, against.
    IBM Rational Application Security Insider: Web Application Security Scanner Evaluation Criteria v1.0 released!
    Tags: ( scanners )
  5. Dark Reading has a new Tech Center devoted to vulnerability management news and analysis.
    Vulnerability Management Tech Center: News and Analysis
    Tags: ( vulnerability-management )
  6. Hoff says what I've been thinking. Everything isn't cloud and every failure isn't the cloud's fault.
    Cloud: The Other White Meat... | Rational Survivability
    Tags: ( cloud )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. NIST takes on defining the cloud.
    Are the feds the first to a common cloud definition? | The Wisdom of Clouds - CNET News
    Tags: ( cloud )
  2. Ed has penned a nice article on SCAP and vulnerability management.
    How SCAP Brought Sanity to Vulnerability Management
    Tags: ( vulnerability-management )
  3. Want to help shape cloud guidance documentation? Craig tells you how.
    The Cloud Security Alliance Needs You | Cloud Security
    Tags: ( cloud )
  4. This is a bit scary.
    Breaking Into a Home With an iPhone | GNUCITIZEN
    Tags: ( data-availability )
  5. Adrian has a link to a video you must watch. Then ask yourself how far is it from happening.
    Securosis Blog | Data Harvesting and Privacy
    Tags: ( privacy surveillance )
  6. A very good interview that you should read. I caught Lee and Mike Murray's career talk and the ensuing question period at Defcon 15. Good stuff.
    Art of Information Security >> AoIS Interviews Lee Kushner, Part 2
    Tags: ( career )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

Reblog this post [with Zemanta]

{ 0 comments }