Tag Archive

DeepSec 2018 Talk: Security Response Survival Skills – Benjamin Ridgway

Published on October 17, 2018 By sanna

Jarred awake by your ringing phone, bloodshot eyes groggily focus on a clock reading 3:00 AM. A weak “Hello?” barely escapes your lips before a colleague frantically relays the happenings of the evening. As the story unfolds, you start to piece together details leading you to one undeniable fact: Something has gone horribly wrong… Despite […]

DeepSec 2018 Training: Hunting with OSSEC – Xavier Mertens

Published on August 28, 2018 By sanna

“OSSEC is sometimes described as a low-cost log management solution but it has many interesting features which, when combined with external sources of information, may help in hunting for suspicious activity occurring on your servers and end-points”, says Xavier Mertens, who’s giving a training called “Hunting with OSSEC” at this years DeepSec. “During this training, […]

DeepSec Video: IntelMQ

Published on February 26, 2016 By lynx

Handling incidents means that you have to handle information quickly. Collecting, collaboration, and getting the right piece of intel in crucial moments is the key. CERTs know this, and this is why there is IntelMQ. IntelMQ is a solution for collecting and processing security feeds, pastebins, and tweets using a message queue protocol. It’s a […]

DeepSec Video: Legal Responses Against Cyber Incidents

Published on February 16, 2016 By lynx

Despite current efforts to adapt existing legal instruments to regulate hostile activities in cyber space, there is uncertainty about the legal situation of actors affected by these actions. Part of this uncertainty is due to the fact that the cyber domain is technically complex; there is a strong need for collaboration between technical and legal […]

DeepSec 2015 Workshop: Practical Incident Handling – Felix Schallock

Published on October 4, 2015 By sanna

Things go wrong or break, it’s just a matter of time. Ask your sysadmin about this. Apart from wear and tear, there are information security incidents that tend to ruin your perfect day at the office. What happens next? What do you do when noticing that your infrastructure has been compromised? Where do you start? […]

Talk: The Management of IT Threats. European Digital Agenda’s Weakness

Published on September 5, 2011 By lynx

In case you haven’t heard about it, there is a digital agenda for the coming decade, developed by the European Commission. Cited from the web site: Europe 2020 is the EU’s growth strategy for the coming decade. In a changing world, we want the EU to become a smart, sustainable and inclusive economy. These three […]