ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

OWASP BeNeLux 2012 - Invitation

OWASP BeNeLux 2012 - Invitation | ICT Security-Sécurité PC et Internet | Scoop.it
Quick Facts


Date : 29-30 Novembre
Location: Leuven (Belgium)
Price : Free
Places : Limited (First registered, First serve)

Agenda
The agenda is a sound mix between Application Security, Forensics, Risk Management and represents the current security landscape at large rather well: Building security into Applications in Enterprises, Managing Application Level Vulnerabilities, Source code review on a large scale. It also has 2 innovative talks on exploit mitigation and sandboxing javascript.

 

- Browser Security - John Wilander


- Sandboxing Javascript - Lieven Desmet


- Body Armor for Binaries - Asia Slowinska


- Forensics - Marc Hullegie and Kees Mastwijk


- Streamlining Application Vulnerability Management: Communication Between Development and Security Teams - Dan Cornell


- Code review for Large Companies - Ruediger Bachmann


- Making Security Invisible by Becoming the Developer’s Best Friends - Dinis Cruz


- OWASP Top 10 vs Drupal - Erwin Geirnaert


- Panel Discussion about the legal aspects of penetration testing

 

Learn more:

http://blog.zoller.lu/2012/11/owasp-benelux-2012-invitation.html

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Online file sharing poses great security risks

Online file sharing poses great security risks | ICT Security-Sécurité PC et Internet | Scoop.it

As online file sharing becomes increasingly common as a business practice, SMBs are more at risk than ever before, according to Symantec.

 

A new survey revealed that SMB employees are increasingly adopting unmanaged, personal-use online file sharing solutions without permission from IT, part of the broader trend of the consumerization of IT in which the adoption of online services for use on personal mobile devices blurs the lines between work and play.

 

These early-adopter behaviors – like those driving the use of file sharing technology – are making organizations vulnerable to security threats and potential data loss.

 

Read more:

http://www.net-security.org/secworld.php?id=13133

 

No comment yet.