Open Source Security Software Hackathon

by | Feb 22, 2018

On Monday, March 26 Luxembourg will host the third edition of the Open Source Security Software Hackathon. The event, organized by the hack.lu team will bring groups of developers together to work collaboratively on the resolution of incidents in the field of Free Software and Open Source cybersecurity.

The objective of this hackathon is to improve the interoperability and the exchange of information and experiences using different security tools.

Topics such as the different forensic techniques of networks and systems, data mining and the defense of computer equipment operations will be discussed … In addition, there will be talks about projects such as the intelligent threat exchange platform MISP, TheHive, CVE search , AIL, MONARC and the Viper framework.

Attendees can suggest topics of their interest and even present their own Open Source projects and talk about them in this cybersecurity meeting.

The event will be held in the CIRCL office of the new C3 Cyber Competence Center of Luxembourg.

More information and registrations here.

SHARE

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Recent posts

VDI: The most secure environment for hybrid working

Today is Data Privacy Day. The purpose of this date is to raise awareness and promote privacy and data protection best practices. It was initiated by the European Commission, the Council of Europe, and the Data Protection authorities of the European Union’s member states. Their main goal was to drive attention to the importance of privacy, user data protection, and compliance of the General Data Protection Regulation (RGPD). It is a regulation characterized by significant fines for non-compliance since its implementation in 2018.

How to avoid issues with virtual machines

Virtualization comes with a wide range of benefits for organizations. It helps cut IT costs and reduces downtime while increasing efficiency and productivity. It also increases the resiliency of networks, primarily when disasters occur, and promotes more green-friendly operations.

However, using virtual machines also comes with a set of downsides. Information security may get compromised, workloads mixed up, separation duties lost, among other issues. It is vital to know how you can get over these problems, and that’s what this article will discuss.

Let’s get started.

Archives


Stay up to date with all the news from UDS ENTERPRISE through our social networks. Follow us!

Skip to content