Security Company Links
Eleanor Saitta @Dymaxion is a hacker,
designer,
artist, writer, and barbarian.
8 May 2014
Repeat after me: all technical problems of sufficient scope or impact are actually political problems
first.
Hook Analyser A Freeware Malware Analysis and Cyber Threat Intelligence Software.
Cybersecurity is a corrupt industry that needs bad guys to stay lucrative. It's not the best product that wins, but the best marketed product. It is a racket. Without the “robbers,” the “cops” have no business; the more breaches occur, the more money the cybersecurity companies make.
NCSI staged the largest, most successful federal information sharing conference in history on August 21-24, 2006 in Denver. The event, formerly known as the Intelink Conference, and now titled The DNI's Information Sharing Conference & Technology Exposition (DISCo)
F-Secure - I love it.
7/03 The "Security Vulnerability Reporting and
Response
Process"
lays out a regimented timeline and set of steps for the interaction between the person who discovers a
vulnerability and the vendor or vendors affected by the problem. It addresses a wide range of issues,
including how and when to notify the vendor, how the vendor should respond, how long the researcher should
wait for a response and how to resolve communications problems or disputes. OIS members said they were
happy
with the way the comment period went and are satisfied with the final version. BlackHat "Law of Vulnerabilities"
American Society for Industrial Security
BSY's Security Related
Net-pointers
CERT Coordination
Center
Publishes incident notes to provide information about incidents to the Internet community.
CounterPane Counterpane Systems
Internet Security, Inc CRYPTO LINKS
Eggleston's
Internet
Security Starter
Electronic Privacy Information
Center Home Page
FBI
NSA President
Truman's 1952 memorandum establishing the NSA is available on
the website of the National Security Archive here:
The Federal Computer Incident Response Capability
(FedCIRC)
is the central coordination and analysis facility dealing with computer security related issues affecting
the civilian agencies and departments of the Federal Government.
w00w00 Security Research Group
Chris Wysopal is now the director of research and development for @stake
Haven Company - Ryan Lackey ryan@havenco.com (415) 704 3498
Honeynet
Honey pot network can gather evidence for catching and prosecuting hackers. It's Free.
Kevin D. Mitnick, Defensive Thinking Inc., and has written a book on computer security, " The Art of Deception: Controlling the Human Element of Security,"
Lloyd's of London offers Exclusive Insurance
for
Counterpane Customers
Lloyd's of London
is offering insurance against Internet and e-commerce security breaches. Dubbed 'the first of its
kind,' it is designed to protect against loss of revenues and information assets that might be caused
by
hacker attacks and other security problems. The insurance will be offered through Counterpane Internet
Security Inc.Lloyd's of London offers Exclusive Insurance for Counterpane Customers
Piermont Information Systems
Inc.
A consulting firm specializing in security aspects of computer and telephone signaling networks. We also
have extensive experience, and active projects, in the areas of application and system software
development
and large scale system deployment and management.
Qualys
He is also responsible for protecting over 1000 corporate networks, including Tower Record, Mercedes Benz,
and BlueCross BlueShield, via his innovative web service. Gerhard is a respected teacher, speaker,
researcher and writer. His most well-known publications include Active Security, Automating Security
Management, Multi-Tier IDS. He holds several patents on related topics including security integration and
security management. Gerhard is also founder of IDS GmbH, a secure remote tool company acquired by McAfee.
Gerhard teaches on the field of network security at his alma mater, the University of Linz, Austria.
Gerhard
speaks regularly at events such as RSA, InfoSec, SANS, and CSI.
Rob Slade is a data communications and security specialist
Symantec AntiVirus Research Center
The Securiteam
A central Security web site containing all the newest security information from mailing lists, hacker
channels designed to help you cope with the newest security threats and keep you closely updated.
The Shmoo Group
article " The point of the hacker robot is
that it can become an autonomous hacker droid," said Paul Holman, the robot's co-designer, who
demonstrated it for the first time at the DefCon hacker convention here. "It can get in close to the
network. On the offensive side, it can be used for corporate or political espionage. On the defensive
side,
it can be used for network vulnerability assessment."
URBusted.com Nanny Cams
Watchmegrow Daycare Web Cams