ProxyHam BlackHat Talk Closed Down
Via CSO Online's Steven Ragan, writing on the *Salted Hash blog, comes interesting news of the cancellation of Seattle's Rhino Security Labs' founder Ben Caudill's ProxyHam presentation, slated for DefCon 23. That is All.
ICS Cyber-Incidents Not Identified, Reported →
In a tour de force post on the Unfettered blog, highly respected Industrial Control Systems Information Security Professional Joe Weiss targets systemic problems in the ICS arena. One of those problems is apparently the correct identification and reporting of security incidents in the ICS realm. If you read anything today on ICS / SCADA information and Network Security, read Joes' blog post - it's simply that important.
In Search Of... →
National Cybersecurity Center of Excellence →
News, from the National Cybersecurity Center of Excellence (NCCOE) at the National Institute of Standards and Technology (NIST), detailing updates in a wide range of sectors.
Of interest is the Center's Building Block Updates. Comprised of DNS-Based Secured Email and Derived PIV Credentials, the NCCOE is certainly moving forward (as opposed to executing a flawed mandate laterally, as many Agencies appear to be orchestrating as of this writing...) as we had hoped for at the inception of the Center of Excellence. Outstanding!
NIST Revises Random Number Recommended Methods →
In a surprise (but welcomed) action, the National Institute of Standards and Technology (NIST) has officially modified the Institutes' recommended methodology targeting the generation of random numbers.
SANS Spring 2015 PenTest Poster →
Click either image for the SANS link to download your PenTest poster. Enjoy.
Tempus, Cifíxus Præcisione Introrsum →
Mother's Security
via Norse Security's Glen Norman (also from Hacker High School), comes this interesting opinion piece on the difficulty of security implementations at the desktop... Today's Must Read!
Wassenaar, The Arrangement →
via Wired's Kim Zetter, comes reportage, detailing the proposed ban on bitwise munitions, in this case, the United State's attempts at the utilization of the Wassenaar Arrangement as a foundational source for all things bannable, particularly systems, code, applications, and research in the information security realm...
Evidently, certain interested parties missed that day in law school when the discussion turned to the prohibition of the export of PGP, and the jailing of Phil Zimmermann, including the miniscule effect that effort had on the acquisition of the bits by parties unknown... History - apparently - does offer a repeatable repast.