BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

eEye @ CSI 2010

Posted November 1, 2010    Morey Haber

I just returned from the Computer Security Institute CSI 2010 conference in National Harbor, Maryland. While there, I spoke on the topic of Logic Bombs using modern examples like Aurora and Stuxnet. This was my first time attending a CSI conference and I must honestly state, I was thoroughly impressed with the quality of the conference: great food (no box lunches), and best of all, the other speakers and sessions. Outside of the keynote speeches, the other sessions that caught my interest included details on security awareness and hacking PLC controllers.

The first presentation worth noting was a 50-minute presentation on Information Security Awareness presented by a manager from Sprint/Nextel. While everyone recognizes they should not reveal company secrets, this session covered distinct case studies in which sensitive information was lost ranging from people taking on cell phones in public to two employees chatting at the company fitness center allowing others to overhear their conversations. The common theme throughout the presentation reinforced “a need to know basis”; something the federal government practices all the time. It was a good reminder of old posters that state “Lose Lips Sink Ships” from WWII and we should be aware that data leak protection can occur both socially and electronically.

The second presentation worth mentioning was by a Principal Architect from Juniper. During her session, she demonstrated how malware can compromise a control system and the devastating events that could occur after. Her case studies were thorough citing recent examples in Stuxnet and others throughout the last decade. This presentation was directly before mine and was a perfect lead-in to my Logic Bombs presentation.

All in all, the CSI Conference was completely worth the time I attended. I look forward to speaking at it again, and attending similar conferences to explain the modern threats we all face in light of Logic Bombs and other modern security threats.

Leave a Reply

Additional articles

PowerBroker for Unix & Linux helps prevent Shellshock

Posted September 25, 2014    Paul Harper

Like many other people who tinker with UNIX and Linux on a regular basis, BASH has always been my shell of choice.  Dating back to the early days moving from Windows to a non-Windows platform, mapping the keys correctly to allow easy navigation and control helped ensure an explosion of use for the shell. Unfortunately,…

Bash “Shellshock” Vulnerability – Retina Updates

Posted September 24, 2014    BeyondTrust Research Team

A major vulnerability was recently discovered within bash which allows arbitrary command execution via specially crafted environment variables. This is possible due to the fact that bash supports the assignment of shell functions to shell variables. When bash parses environment shell functions, it continues parsing even after the closing brace of the function definition. If…

pbps-blog3

7 Reasons Customers Switch to Password Safe for Privileged Password Management

Posted September 24, 2014    Chris Burd

It’s clear that privileged password management tools are essential for keeping mission-critical data, servers and assets safe and secure. However, as I discussed in my previous post, there are several pitfalls to look out for when deploying a privileged password management solution. At this point, you may be wondering how BeyondTrust stacks up. With that,…

Tags:
, , , , ,