2nd Annual Trusted Computing Conference

/
The 2nd Annual NSA Trusted Computing Conference & Exposition, hosted by the National Security Agency, taking place 20 -22 September in Orlando, FL is just around the corner. This year's conference presents the theme, "Using COTS Technologies to Deliver Decisive Defensive Advantage." Join senior executives and IT security thought leaders from government, industry and academia, and be a part of the discussions about the security of vital data, networks and critical enterprise applications.

Mobile Security eSymposisum – LIVE next Thursday

/
To safeguard mobile devices used by business executives, the data stored on them and the connectivity to corporate networks they enable is a constant trial - one that is infrequently satisfactorily remedied. This is leaving many security pros comparing themselves to Sisyphus rolling a giant boulder up a steep hill over and over. The difference: mobile security troubles only grow heavier. Not only are smartphones, tablets and other devices now ubiquitous, they're often brought from home. So, just how are companies supposed to secure these things - some private, some corporate-issued? How can such a heterogeneous environment be centrally managed and safeguarded? What about all those applications end-users keep downloading? What about the data they want to download on them? Any legal ramifications? How does the company stay compliant? We'll provide some answers.

Morto Computer Worm Infecting Computers via Remote Desktop Protocol (RDP)

/
A new worm called Morto has begun making the rounds on the Internet in the last couple of days, infecting machines via RDP (Remote Desktop Protocol). The worm is generating a large amount of outbound RDP traffic on networks that have infected machines, and Morto is capable of compromising both servers and workstations running Windows. If you have any questions or need assistance, please let me know and I will follow up with you. Additional Information: • http://threatpost.com/en_us/blogs/new-worm-morto-using-rdp-infect-windows-pcs-082811 • http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Worm%3aWin32%2fMorto.A • http://blogs.computerworld.com/18870/morto_worm_spreading_fast_via_rdp?af

Security Conference “DerbyCon” Makes a Splash in the Information Security Field with a Huge Speaker Lineup. A New Hackercon is Born

/
DerbyCon is a new hacker conference in the heart of Louisville, Kentucky's 4th Street Live. DerbyCon isn’t just another security conference, we’ve taken the best elements from all of the conferences we’ve ever been to and put them into one. This conference is a place you can call home, where you can meet each other or new people, party, and learn.

1105 MEDIA ANNOUNCES KEYNOTES FOR INAUGURAL 2011

/
1105 Government Information Group, the leading provider of integrated information and media for the government information technology (IT) market, today announced new keynote presenters for its 2011 Geospatial Summit. The event will be held September 13, 2011 at the Hyatt Dulles in Herndon, Virginia. The opening keynote address, GIS to the Rescue: The Critical Role of Geospatial Technology in Disaster Response will provide an account of a real-world emergency response from veteran disaster relief expert Michael Byrne, Leader -National Incident Management Assistance Team - Blue (N-IMAT Blue), Federal Emergency Management Agency (FEMA), as well as the technical expertise of Russ Johnson, Director - Public Safety and Homeland Security, Esri.

U.N. Cybersecurity Arm Endorses EC-Council’s Global CyberLympics

/
Aug 4, 2011 | ALBUQUERQUE, NM - The cybersecurity executing arm of the United Nations has endorsed the Global CyberLympics, a new initiative by the EC-Council to foster stronger international cooperation on information security issues and to improve cybersecurity training and awareness in developing nations and third world countries.