SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
FOR IMMEDIATE RELEASE:                               Contact: Marketing, (469) 360 - 4061
                                                              marketing@hawkdefense.com


          AIX SECURITY EXPERT SELECTED TO PRESENT AT BLACK HAT 2010
                    -- Tim Shelton to speak on AIX Server Security


Dallas, Texas – June 22, 2010 – HAWK Network Defense (www.hawkdefense.com) today
announced that the company’s VP of Research and Development, Tim Shelton was selected to
present at Black Hat USA 2010. Shelton will speak about Advanced AIX Heap Exploitation
Methods. Black Hat USA 2010, known as the premiere venue for elite security researchers, will
be held at Caesar’s Palace in Las Vegas, from July 27 to July 28.

Shelton’s presentation is timely given the amount of attacks on enterprises over the past
decade. “Many of the largest enterprises in the world run their businesses on AIX systems,”
states AIX reseller Phil Godwin, the Vice President of Sales and Marketing at Clear
Technologies (www.cleartechnologies.net), “as a result, it is imperative that security gaps on
these systems be mitigated.”

Shelton’s presentation will expose the security risk that could potentially halt the productivity of
some of the largest companies in the world. His presentation will reveal Heap Exploitation
Methods that prey on AIX servers, delineate the magnitude of the risk, and provide insights to
limit future exposure.

About HAWK Network Defense
HAWK Network Defense, Inc., is a privately funded security information event management
company founded in 2006. HAWK’s patent-pending product, Dynamic Log AnalysisTM, uses
Naïve-Bayesian Histogram Analysis technology that acts as a team of experienced security
analysts to proactively mitigate risk and transforms the tedious and time consuming task of
event logging into a dynamic, powerful experience. HAWK Network Defense is headquartered in
the Dallas, Texas and its product, Dynamic Log AnalysisTM, is exclusively distributed through
Clear     Technologies      of     Coppell,    Texas.    For    more     information,     visit
www.hawknetworkdefense.com or www.cleartechnologies.net/Security.

Contact:
Marketing, (469) 360 – 4061
HAWK Network Defense
Dallas, Texas 75229
###

Más contenido relacionado

Más de Clear Technologies

Proactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsProactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsClear Technologies
 
Visual Sorage Intelligence™ Product Guide
Visual Sorage Intelligence™ Product GuideVisual Sorage Intelligence™ Product Guide
Visual Sorage Intelligence™ Product GuideClear Technologies
 
Visual Storage Intelligence™ Case Story Final
Visual Storage Intelligence™ Case Story FinalVisual Storage Intelligence™ Case Story Final
Visual Storage Intelligence™ Case Story FinalClear Technologies
 
Remote Administration Case Story - 4 Front
Remote Administration Case Story  - 4 FrontRemote Administration Case Story  - 4 Front
Remote Administration Case Story - 4 FrontClear Technologies
 
Legal Departments' Security Responsibility - Dynamic Log Analysis™
Legal Departments' Security Responsibility   - Dynamic Log Analysis™Legal Departments' Security Responsibility   - Dynamic Log Analysis™
Legal Departments' Security Responsibility - Dynamic Log Analysis™Clear Technologies
 
6 reasons bankers should buy dynamic log analysis™
6 reasons bankers should buy dynamic log analysis™6 reasons bankers should buy dynamic log analysis™
6 reasons bankers should buy dynamic log analysis™Clear Technologies
 
6 reasons insurance companies should buy dynamic log analysis™
6 reasons insurance companies should buy dynamic log analysis™6 reasons insurance companies should buy dynamic log analysis™
6 reasons insurance companies should buy dynamic log analysis™Clear Technologies
 
Security level 40 product guide final
Security level 40 product guide finalSecurity level 40 product guide final
Security level 40 product guide finalClear Technologies
 
Dynamic Log Analysis Product Guide
Dynamic Log Analysis  Product GuideDynamic Log Analysis  Product Guide
Dynamic Log Analysis Product GuideClear Technologies
 
Dynamic Log Analysis™ Case Story City of Colleyville
Dynamic Log Analysis™ Case Story City of ColleyvilleDynamic Log Analysis™ Case Story City of Colleyville
Dynamic Log Analysis™ Case Story City of ColleyvilleClear Technologies
 
Dynamic Log Analysis™ Case Story Hutton Communications
Dynamic Log Analysis™ Case Story Hutton CommunicationsDynamic Log Analysis™ Case Story Hutton Communications
Dynamic Log Analysis™ Case Story Hutton CommunicationsClear Technologies
 
Dynamic Log Analysis™ Business Value Sheet
Dynamic Log Analysis™ Business Value SheetDynamic Log Analysis™ Business Value Sheet
Dynamic Log Analysis™ Business Value SheetClear Technologies
 
3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil GodwinClear Technologies
 
Proactive Log Management in Banking - Why is it important and what inhibits i...
Proactive Log Management in Banking - Why is it important and what inhibits i...Proactive Log Management in Banking - Why is it important and what inhibits i...
Proactive Log Management in Banking - Why is it important and what inhibits i...Clear Technologies
 
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms  by Tim SheltonSophisticated Security - Naïve Bayesian Algorithms  by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms by Tim SheltonClear Technologies
 
Dynamic Log Analysis - The Future
Dynamic Log Analysis - The FutureDynamic Log Analysis - The Future
Dynamic Log Analysis - The FutureClear Technologies
 

Más de Clear Technologies (16)

Proactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsProactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van Symons
 
Visual Sorage Intelligence™ Product Guide
Visual Sorage Intelligence™ Product GuideVisual Sorage Intelligence™ Product Guide
Visual Sorage Intelligence™ Product Guide
 
Visual Storage Intelligence™ Case Story Final
Visual Storage Intelligence™ Case Story FinalVisual Storage Intelligence™ Case Story Final
Visual Storage Intelligence™ Case Story Final
 
Remote Administration Case Story - 4 Front
Remote Administration Case Story  - 4 FrontRemote Administration Case Story  - 4 Front
Remote Administration Case Story - 4 Front
 
Legal Departments' Security Responsibility - Dynamic Log Analysis™
Legal Departments' Security Responsibility   - Dynamic Log Analysis™Legal Departments' Security Responsibility   - Dynamic Log Analysis™
Legal Departments' Security Responsibility - Dynamic Log Analysis™
 
6 reasons bankers should buy dynamic log analysis™
6 reasons bankers should buy dynamic log analysis™6 reasons bankers should buy dynamic log analysis™
6 reasons bankers should buy dynamic log analysis™
 
6 reasons insurance companies should buy dynamic log analysis™
6 reasons insurance companies should buy dynamic log analysis™6 reasons insurance companies should buy dynamic log analysis™
6 reasons insurance companies should buy dynamic log analysis™
 
Security level 40 product guide final
Security level 40 product guide finalSecurity level 40 product guide final
Security level 40 product guide final
 
Dynamic Log Analysis Product Guide
Dynamic Log Analysis  Product GuideDynamic Log Analysis  Product Guide
Dynamic Log Analysis Product Guide
 
Dynamic Log Analysis™ Case Story City of Colleyville
Dynamic Log Analysis™ Case Story City of ColleyvilleDynamic Log Analysis™ Case Story City of Colleyville
Dynamic Log Analysis™ Case Story City of Colleyville
 
Dynamic Log Analysis™ Case Story Hutton Communications
Dynamic Log Analysis™ Case Story Hutton CommunicationsDynamic Log Analysis™ Case Story Hutton Communications
Dynamic Log Analysis™ Case Story Hutton Communications
 
Dynamic Log Analysis™ Business Value Sheet
Dynamic Log Analysis™ Business Value SheetDynamic Log Analysis™ Business Value Sheet
Dynamic Log Analysis™ Business Value Sheet
 
3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin
 
Proactive Log Management in Banking - Why is it important and what inhibits i...
Proactive Log Management in Banking - Why is it important and what inhibits i...Proactive Log Management in Banking - Why is it important and what inhibits i...
Proactive Log Management in Banking - Why is it important and what inhibits i...
 
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms  by Tim SheltonSophisticated Security - Naïve Bayesian Algorithms  by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
 
Dynamic Log Analysis - The Future
Dynamic Log Analysis - The FutureDynamic Log Analysis - The Future
Dynamic Log Analysis - The Future
 

Último

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Hawk Network Defense for immediate release black hat 2010 - aix vulnerabilities

  • 1. FOR IMMEDIATE RELEASE: Contact: Marketing, (469) 360 - 4061 marketing@hawkdefense.com AIX SECURITY EXPERT SELECTED TO PRESENT AT BLACK HAT 2010 -- Tim Shelton to speak on AIX Server Security Dallas, Texas – June 22, 2010 – HAWK Network Defense (www.hawkdefense.com) today announced that the company’s VP of Research and Development, Tim Shelton was selected to present at Black Hat USA 2010. Shelton will speak about Advanced AIX Heap Exploitation Methods. Black Hat USA 2010, known as the premiere venue for elite security researchers, will be held at Caesar’s Palace in Las Vegas, from July 27 to July 28. Shelton’s presentation is timely given the amount of attacks on enterprises over the past decade. “Many of the largest enterprises in the world run their businesses on AIX systems,” states AIX reseller Phil Godwin, the Vice President of Sales and Marketing at Clear Technologies (www.cleartechnologies.net), “as a result, it is imperative that security gaps on these systems be mitigated.” Shelton’s presentation will expose the security risk that could potentially halt the productivity of some of the largest companies in the world. His presentation will reveal Heap Exploitation Methods that prey on AIX servers, delineate the magnitude of the risk, and provide insights to limit future exposure. About HAWK Network Defense HAWK Network Defense, Inc., is a privately funded security information event management company founded in 2006. HAWK’s patent-pending product, Dynamic Log AnalysisTM, uses Naïve-Bayesian Histogram Analysis technology that acts as a team of experienced security analysts to proactively mitigate risk and transforms the tedious and time consuming task of event logging into a dynamic, powerful experience. HAWK Network Defense is headquartered in the Dallas, Texas and its product, Dynamic Log AnalysisTM, is exclusively distributed through Clear Technologies of Coppell, Texas. For more information, visit www.hawknetworkdefense.com or www.cleartechnologies.net/Security. Contact: Marketing, (469) 360 – 4061 HAWK Network Defense Dallas, Texas 75229 ###