BSides Charlotte Security Conference June 7 and 8, 2013
Security BSides Charlotte will occur in combination with the SouthEast LinuxFest (SELF) on June 7 and 8, 2013 at the Blake Hotel located at 555 S McDowell St, Charlotte, NC. The registration cost is free as long as you SELF.
Are you interested in presenting? Click the CFP link to submit your idea.
For more information on the upcoming inaugural BSides event click here.
DoD Inspector General Calls Out Army CIO For Poor Mobile Device Security
An posting from Threat post on mobile device Security: The CIO of the U.S. Army failed to put in place a comprehensive security program capable of protecting data stored on commercial mobile devices such as iPhones and Androids, leaving sensitive information in key Army installations exposed. The Inspector General of the Department of Defense took the Army CIO to task in a new report, saying that the CIO “did not implement an effective cybersecurity program for [commercial mobile devices]”.
The Office of the Inspector General for the DoD set out to see how certain parts of the Army were handling the challenge of protecting sensitive data in the era of mobile computing. The OIG went to the U.S. Military Academy and the U.S. Army Corps of Engineers Engineer Research and Development Center to look at the facilities’ security programs and see whether they had safeguards in place to mitigate the risks of mobile devices in their environments, essentially the same risks that enterprises face with the BYOD problem.
To read more click here:
Defcon Kerala Information Security Meet 2013
We invite all the information security enthusiasts, hackers, coders, programmers, security & network professionals, web developers, students, academic practitioners, government, police, business & corporate and all of those who care about ‘Information Security’ to Defcon Kerala Information Security Meet. We invite you to attend the talks of Speakers and to expand your Network.
To read more click here:
Companies Buying More Insurance Against Cyberattacks
An posting from Tech news daily Companies are getting smarter about protecting themselves from cyberattacks. New research has found that the number of companies purchasing cyberinsurance increased 33 percentage points over the past year.
Several industries are driving that growth. Professional, business
, legal, accounting and personal services firms grew by 76 percentage points across 2012.
To read more click here:
NSA Director: Information-Sharing Critical To U.S. Cybersecurity
An posting from Dark Reading about cyber security: Information-sharing and visibility into the threat landscape are vital for the public and private sectors to defend cyberspace, National Security Agency Director Gen. Keith B. Alexander told an audience at The Georgia Tech Cyber Security Symposium yesterday.
The key to this is crafting legislation that protects privacy while facilitating sharing between intelligence agencies, Internet Service Providers (ISPs), and critical infrastructure, explained Alexander at the two-day event at Georgia Tech University.
To read more a click here:
Too Scared To Scan
An article from Dark Reading in there Security section: When it comes to detecting vulnerabilities in mission-critical applications, security professionals often find themselves in a bind. These are usually the applications that the enterprise can least afford to suffer a hack. But at the same time, they are also the applications whose owners are most likely to balk at security testing or scanning probes while they’re live. These opponents to vulnerability scans on production applications point to the near-infinitesimal tolerance for downtime or disruption as reason enough to leave well enough alone. But according to security professionals, someone will eventually find those vulnerabilities and if the organization doesn’t do it first odds are it is the bad guys who will ferret out the flaws.
“Scanning production applications is a challenging proposition, as availability and data integrity are paramount for organizations,” says Wolfgang Kandek, CTO of Qualys. “However, security has become as important as availability, and anyway, attackers are doing their own scanning to map out the assets of the organizations, whether we like it or not.”
To read more click here:

