For Systems Administrators who missed this broadcast live, it is also
available via a recorded webcast.

I most highly recommend that if you are in charge of any server that is
vulnerable to heartbleed (in CentOS terms, that is anyone with SSL/TLS
services and CentOS-6.5 installed) that you absolutely make time to
watch and understand this video.  It is 1 hour and 12 minutes long. 

Watch this ... Do it.

Note:  It does require a SANs Login .. you should have one anyway :)
 

On 04/09/2014 12:44 PM, Connie Sieh wrote:
> For even more information about "Heartbleed".
>
> -Connie Sieh
>
> ---------- Forwarded message ----------
> Date: Wed, 9 Apr 2014 12:27:54 -0500
> From: The SANS Institute <newsbi...@sans.org>
> Subject: FLASH NewsBites - Heartbleed Open SSL Vulnerability
>
> FLASH NewsBites - Heartbleed Open SSL Vulnerability
>
> FLASH NewsBites are issued only when a security event demands global and
> immediate action.  The HeartBleed Open SSL vulnerability fits that
> description.
>
> Proof: More than 200 students at SANS 2014 in Orlando this week spent 2
> hours in a briefing on Heartbleed last night after full days of classes.
> This one matters.
>
> Tonight at 8:15 SANS faculty member Jake Williams will present a
> briefing explaining the HeartBleed vulnerability and what it means to
> you. Jake says: "Another 24 hours have passed since the initial
> presentation and we know more about what is vulnerable and what isn't.
> Even if you attended the short presentation last night at #SANS2014,
> this is a don't miss event."
>
> Jake will cover the actual structure of the vulnerability, methods for
> detection, and what you need to do (both as a systems admin and an end
> user). Jake will also perform live demos against a vulnerable server so
> you see first hand what can be exposed. Finally, we'll be releasing
> packet captures containing the exploit (suitable for testing your IDS
> rules).
>
> Register at:
> https://www.sans.org/webcasts/openssl-heartbleed-vulnerability-98105
>
> Jake Williams, a principal consultant at CSRgroup Computer Security
> Consultants, has over a decade of experience in secure network design,
> penetration testing, incident response, forensics, and malware reverse
> engineering. Prior to joining CSRgroup, he worked with various
> government agencies in information security roles.
>
> Jake has twice won the annual DC3 Digital Forensics Challenge and has
> spoken at several regional ISSA meetings, Shmoocon, and the DC3
> Conference, as well as numerous US government conferences.
>
> Jake is currently pursuing a PhD in Computer Science where he is
> researching new techniques for botnet detection. His research interests
> include protocol analysis, binary analysis, malware RE methods,
> subverting the security of cloud technologies, and methods for
> identifying malware Command and Control (C2) techniques.
>
> _______________________________________________
> CentOS mailing list
> CentOS@centos.org
> http://lists.centos.org/mailman/listinfo/centos
>


Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to