|
OWASP AppSec California 2015 - Proactively defending your business against security protocol attacks and implementation flaws |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
OWASP AppSec California 2015 - Proactively defending your business against security protocol attacks and implementation flaws Par SecurityTube.NetLe [2015-06-13] à 12:13:58
Présentation : Abstract HTTPS SSL TLS has been under fire for years. BEAST, CRIME, problems with the weakness of the CA system, problems with various versions of the protocol and more have plagued HTTPS to be less than satisfactory, at best, as a transport security protocol. Some of the most popular algorithms used to secure communications are getting close to their end of life. Proper protection of information in the upcoming years will require adoption of new technology and standards. Recent enhancements in browsers have made encryption in transit over the web viable for the first time in history and it s imperative that everyone understand them. This presentation will start by reviewing some of the most recent cases related to security protocols flaws and weaknesses of cryptografic standards that should be proactively phased out. This pragmatic presentation will then discuss possible mitigations and their limitations, along with valuable implementation advice. Bio Cassio Goldschmidt is a globally recognized information security leader with strong background in both product and program-level security. Outside work, Cassio is known for his contributions to Open Web Application Security Project OWASP , Software Assurance Forum for Excellence in Code SAFECode , the Common Weakness Enumeration CWE SysAdmin, Audit, Network, Security SANS Top 25 Most Dangerous Software Errors, along with contributing to the security education curriculum of numerous universities and industry certifications. Cassio was one of the three finalist in the first ISC ² Americas Information Security Leadership ISLA Awards 2011 in the Information Security Practitioner category and endowed with the special Community Service Star award during the same occasion. In 2012 Cassio was one of the finalists of the first OWASP Web Application Security Person of the Year WASPY Awards. Cassio holds a number of US patents and is an accomplished writer and presenter in the field of application security Cassio holds a bachelor degree in computer science from Pontificia Universidade Catolica do Rio Grande Do Sul, a masters degree in software engineering from Santa Clara University, and a masters of business administration from the University of Southern California. Jim Manico authors and delivers developer security awareness training and has a 20 year history building software as a developer and architect. Jim is also a global board member for the OWASP foundation where he helps drive the strategic vision for the organization. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and several secure coding projects. For More Information Please Visit - https 2015.appseccalifornia.org
Les mots clés de la revue de presse pour cet article : california security protocol implementation Les videos sur SecuObs pour les mots clés : defending security protocol implementation Les mots clés pour les articles publiés sur SecuObs : security protocol Les éléments de la revue Twitter pour les mots clé : security protocol implementation
Les derniers articles du site "SecurityTube.Net" :
- TROOPERSCON - Crypto code the 9 circles of testing - TROOPERSCON - Towards a LangSec Aware SDLC - TROOPERSCON - Deep dive into SAP archive file formats - TROOPERSCON - Thanks SAP for the vulnerabilities. Exploiting the unexploitable - TROOPERSCON - An easy way into your multi-million dollar SAP systems An unknown default SAP account - TROOPERSCON - One Tool To Rule Them All - TROOPERSCON - Mind The Gap - Exploit Free Whitelisting Evasion Tactics - TROOPERSCON - The Chimaera Processor - TROOPERSCON - Lets Play Hide and Seek in the Cloud - TROOPERSCON - Planes, Trains and Automobiles The Internet of Deadly Things
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|