Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store

Shows and Events

Shows and Events

Qualys talks to us about getting a handle on security and feature parity in the cloud

Black Hat 2016, Las Vegas, NV
We had the chance to sit down with Chris Carlson, vice president of product management for Qualys and talk a little about what Qualys is up to and where they are moving to in the security market. For many Qualys is a name that brings vulnerability management and reporting   to mind. This is due to the fact that this has been their bread and butter for a number of years. Now they are moving into new verticals in the market to expand on their knowledge in this arena. One of the highlights of the talk was in coving their Cloud Agent which brings a whole new set of features to the Qualys product line.

Details
By Sean Kalinich
Sean Kalinich
Aug 09
Hits: 6035
  • Security
  • PCI
  • IOC
  • Qualys
  • Vulnerability Management
  • HIPPA
  • Threat Protect
  • Q Cloud
  • Patch Management

Read more: Qualys talks to us about getting a handle on...

No comments on “Qualys talks to us about getting a handle on security and feature parity in the cloud”
Shows and Events

Cymmetria shows us a new type of deception at DEF CON using MazeRunner

DEF CON 24 - Las Vegas, NV
The term Honey Pot is one that most people are very aware of. It is a form of detection that is designed to lure an attacker into targeting a simulated system so that you can identify their techniques and tools. Honey pots have been used to gather intelligence about bot nets, malware in the wild and many other forms of malicious activity. The problem now is that these simulated systems are very easy to identify and avoid by today’s advanced attackers.

Details
By Sean Kalinich
Sean Kalinich
Aug 06
Hits: 6445
  • Hacking
  • Securty
  • DEF CON
  • DEF CON 24
  • MazeRunner
  • Deception
  • Cymmertia
  • Honey Pots

Read more: Cymmetria shows us a new type of deception at...

No comments on “Cymmetria shows us a new type of deception at DEF CON using MazeRunner”
Shows and Events

Ionic Security says they can make your data useless to the bad guys

Last year at Black Hat USA 2014 we met up with a company that was looking to make some changes in the way we protect our data, Ionic Security. The concept was very simple, but the implementation was sure to be complex. I was not sure that what they wanted to accomplish could even happen. However, after a conversation with them I became more than interested. It was a simple concept, but it did not need to be overly complex. To make things even more interesting this was not a truly new idea, but it was one that had never been implemented for real data security.

Details
By Sean Kalinich
Sean Kalinich
Aug 12
Hits: 5772
  • Hacking
  • Security
  • Malware
  • Encryption
  • Data Protection
  • Black Hat 2015
  • Ionic

Read more: Ionic Security says they can make your data...

No comments on “Ionic Security says they can make your data useless to the bad guys”
Shows and Events

Trustwave shows off an impressive copromise of RIG's admin servers at Black Hat 2015

In addition to seeing more than a few products and ideas during Black Hat and DEF CON we also had the chance to see something really cool from the team at Trustwave. This was not a product, but a chance to see the back end of the command and control servers for a new and improved version of the RIG exploit kit. To say that what they showed was impressive is an understatement.

Details
By Sean Kalinich
Sean Kalinich
Aug 09
Hits: 5949
  • Hacking
  • Security
  • Malware
  • Trustwave
  • RIG
  • Exploit Kits
  • Ad Fraud
  • Malvertising

Read more: Trustwave shows off an impressive copromise of...

No comments on “Trustwave shows off an impressive copromise of RIG's admin servers at Black Hat 2015”
Shows and Events

If the barbarians are past the gates how do you protect your data from being looted? enSilo says they have a way

The one common thing that I keep hearing everyone talk about at Black Hat and even DEF CON is how to protect your data. It is pretty much a given that if someone wants to get into your network they are going to get in. The number of flaws, vulnerabilities and compromises that are out there are simply too many to protect against. So there needs to be some other method to make sure that any sensitive data that you have is keep out of the hands of the “bad guys”. There are many suggestions about this, but most of them still try to do the same things stop the barbarians at the gate.

Details
By Sean Kalinich
Sean Kalinich
Aug 09
Hits: 4937
  • Hacking
  • Security
  • Malware
  • Black Hat
  • Data Theft
  • Breaches
  • Ransomware
  • enSilo

Read more: If the barbarians are past the gates how do you...

No comments on “If the barbarians are past the gates how do you protect your data from being looted? enSilo says they have a way”

More Articles …

  1. With the trend of hacking Encryption,Certs and Keys; how do you really know who to trust?
  2. Alien Vault is bringing threat intel to the masses with their latest version of Open Threat Exchange
  3. Thermaltake at CES 2015 almost had too much to see in one visit
  4. Patriot talks about memory, portable power and a few other things at CES 2015
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10

Page 3 of 10

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech