VMware’s 3rd Annual Federal Technical Conference in DC

VMware, Inc. makes virtualization software that runs on Microsoft Windows, Linux and Mac OS X as well as directly on server hardware without requiring an installed operating system call VMware ESX.

The VMware 3rd annual federal technical conference will be in Washington DC on Tuesday, June 15, 2010 between 8:30am – 4:00pm at the Grand Hyatt.  It is the largest federal end-user event where IT and IT Security personnel will learn about the latest VMware solutions and how they support federal enterprises in all areas of government.

Adrian Williams of SecurityOrb.com, which is an Information Security media organization based in the Washington DC Metro area stated, “We have long seen the benefits of VMware’s workstation product in the incident response side of the game.  VMware workstation would allow us to run malware or analysis compromised systems in a safe environment.”

Due to limited space, the event is giving priority to government and systems integrator personnel first.  Key topics of the event will include Desktop Virtualization with VMware View 4.5, Managing & Automating Virtual Enterprise Infrastructure, Security in a Virtual Environment and Building & Managing Cloud-Ready Applications to name a few.

Sponsoring the event are Dell, Swish Data Corp, Force 3 and Quest Software.

For more detailed information on the VMware 3rd annual federal technical conference go to their website or contact:

Ben Baldi
VMware Government at Carahsoft
703-230-7407 (Direct)
888-6VMWARE (Toll-Free)
ben.baldi@carahsoft.com

The event location has been listed below, and taking the metro is highly recommended.

Grand Hyatt Washington

1000 H Street NW,
Washington, D.C., USA 20001
Tel: +1 202 582 1234    Fax: +1 202 637 4781

By Metro: Take the Blue line to Metro Center stop.  There is an entrance to the Grand Hyatt Washington in the station.

IT Security Policy: The First Line of Defense

As a security professional, I am amaze when I find that an organization does not have an IT security policy in place.

An IT security policy is a statement by management to how the organization will protect their resources from unauthorized access, alteration, or destruction. The IT security policy also provides a blueprint of management’s strategy as regards information security.

An IT Security policy usually consist of the following categorizes:

1. Corporate Policy
2. Information Security Policy
3. Personnel Security Policy
4. Physical and environmental security policy
5. Computer & Networks Security Policy
* System Administration
* Network Policy
* Application Development Policy
6. Business Continuity Planning

The Purpose of an IT Security Policy

The purpose of the information security policy is to establish a corporate-wide approach to information security. To also prescribe mechanisms that help identify and prevent the compromise of information security and the misuse of corporate data, applications, networks and computer systems. Lastly, to implement effective controls for responding to incidents and external complaints.

For more information on IT Security Policies and other documents please visit www.securityorb.com

Adobe Zero-Day Attack on DC-Based Organizations

On June 4, 2010, Adobe announced a critical vulnerability with Adobe Flash Player, Adobe Reader and Acrobat that could allow attackers to take control of the affected system. While Adobe is working to release a fix, the vulnerability is being actively exploited in what are known as Zero-Day attacks. 

Since then, a series of Advanced Persistent Threat (APT) attacks have been launched against corporate employees in the form of emails that contain malicious links to sites that use this vulnerability. As of last night, SecurityOrb.com a Washington DC Based Information Security media company has obtained information that a number of corporate employees had received such emails and many of them had clicked on the links causing their machines to be compromised.

SecurityOrb, LLC is asking everyone to take extra caution and validate the sender on all emails before opening them. All externals emails should be scrutinized closely before opening any attachment or clicking any links.

SecurityOrb.com has also obtain information many of these organizations are blocking all Flash downloads from the Internet. This means that users will not be able to view Flash videos/animation in certain web sites they visit. Adrian Williams of SecurityOrb.com stated, “We do not know how long it will take Adobe to come up with a fix, but it is very important for organizations to implement the proper security controls until the matter has been resolved.”

If you have a business critical need to access Flash video in a specific business-related web site, please contact our Service Desk or Internet Service Provider with the site information and business justification and they may be willing to have it white-listed (allowed) for you to access it.

Please continue to be vigilant and never assume you are protected. Visit SecurityOrb.com for additional tips on how you can be secure.

Sources:
http://threatpost.com/en_us/blogs/adobe-warns-flash-pdf-zero-day-attack-060410
http://maximumitblips.dailyradar.com/story/zero-day-attack-targets-adobe-1/
http://community.norton.com/t5/Tech-Outpost/Security-Alert-0-Day-Attack-In-The-Wild-for-Adobe-Flash-Reader/m-p/238417
http://www.pcworld.com/article/159915/adobe_reader_suffers_targeted_zeroday_attacks.html

A Post without Image

Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Read more

HTML Styles

Image aligned left & right

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.rum.

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

Read more