Daily Archive: April 20, 2012

Certificate Authorities: A Means to Advanced Security, But Not the End 0

Certificate Authorities: A Means to Advanced Security, But Not the End

“Certificate authorities (CAs) are critical links in the chain that ensures the quality and integrity of enterprise IT security, compliance and operations. CAs issue and ensure valuable third-party trust for human-to-machine and machine-to-machine communications and authentication. However, leveraging the security benefits of trust providers like CAs doesn't relieve your organization of its management responsibilities….”

Javvad Malik on Hacking Tools and Ethics 0

Javvad Malik on Hacking Tools and Ethics

“Joshua Corman wrote a post entitled HD Moores Law in which he raises some valid points around the fact that tools like Metasploit make it incredibly easy for anyone with little or no knowledge to be able to test a system for vulnerabilities. Naturally, the purpose of this or other such tools is to aid a security tester in finding these vulnerabilities. However, like any such tool, you cannot dictate if someone will use this for attack or defensive purposes….”

On Cyber Threats in the Mobile Environment 0

On Cyber Threats in the Mobile Environment

“Today I desire to share with you the results of a study by security firm Trend Micro which is focused on mobile threat incidents related to the first quarter of 2012. The large diffusion of mobile devices and the lack of awareness of principal cyber threats have produced an increasing interest by cybercriminals in the mobility sector, and the Android platform is the most targeted with over 5000 new malicious apps.