mnemonic's Jan Henrik Straumsheim held a great presentation at NorSIS' conference Kritisk IS on Wednesday May 29th. There were close to 100 participants hearing his story of how a serious hacking incident was handled by the mnemonic IRT (mIRT).
After more than 5 years working in SIEM projects, I've decided to move into the GRC space. In this post, I'd like to summarized the most important lesson I've learned during my SIEM journey.
A new Internet Explorer 8 0-day vulnerability was discovered in use on US goverment websites last week.
On Tuesday April 16th, Oracle released a security update for Java Run-time Environment (JRE) 1.7.0 Update 17. The following day, the source code for a proof of concept exploit was released . The exploited vulnerability is one of the vulnerabilities that was supposedly patched in the latest update from Oracle .
BYOD (Bring Your Own Device) is a trend that has quickly evolved from a privilege of specific user groups to an expectation of all employees. Worldwide, individuals are choosing (see: demanding) to use their personal smartphones and tablets to access corporate resources. Unfortunately for IT, this push is often top-down, meaning c-level executives are the driving force behind the organization implementing a BYOD program.