logo
#

Latest news with #Wireshark

Sysdig Donates Stratoshark to the Wireshark Foundation to Advance Open Source Cloud Security
Sysdig Donates Stratoshark to the Wireshark Foundation to Advance Open Source Cloud Security

Business Wire

time14-05-2025

  • Business
  • Business Wire

Sysdig Donates Stratoshark to the Wireshark Foundation to Advance Open Source Cloud Security

SAN FRANCISCO--(BUSINESS WIRE)--Sysdig, the leader in real-time cloud security, today announced the donation of Stratoshark, the company's open source cloud forensics tool, to the Wireshark Foundation. This contribution underscores Sysdig's commitment to fostering innovation within the community, building in the open, and pushing security forward with advanced tools that better understand cloud-native environments. Sysdig's contribution includes Stratoshark's source code, including the code to interface Wireshark with the Falco libraries, in addition to its associated trademarks, logos, and website domains. @Sysdig donates Stratoshark to the Wireshark Foundation to advance open source cloud security. Learn more: Share Stratoshark – developed by Wireshark founder Gerald Combs and Falco creator Loris Degioanni – extends Wireshark 's deep network visibility to the cloud by leveraging Falco 's ecosystem. It combines Wireshark's powerful packet analysis with Falco's robust runtime security for fast troubleshooting, confident incident response, and cloud-native flexibility. Stratoshark equips users to analyze system calls and cloud logs with the same precision and granularity that Wireshark has offered for over 25 years. 'At Sysdig, we fundamentally believe that security should be a collaborative, transparent effort for defenders – not an asymmetrical battle,' said Degioanni, Sysdig Founder and CTO. 'That belief was the foundation for Wireshark and Falco, and it's the guiding principle that led us to create Stratoshark. By donating Stratoshark to the Wireshark Foundation, we're ensuring that the community can continue to innovate, refine, and strengthen security together.' Advancing the Future of Open Source in the Wireshark Foundation The Wireshark Foundation, established in 2023, serves as the custodian for Wireshark and its related open source projects, providing a framework for long-term stewardship, sustainability, and education for a growing community of over 5 million daily users. The nonprofit is also home to SharkFest, Wireshark's developer and user conference, as well as the Wireshark source code and assets. By integrating Stratoshark into its portfolio, the foundation expands its network-centric offerings to address the quickly evolving needs of modern, cloud-native environments. Since its formal launch in January 2025, Stratoshark has expanded its cloud system call analysis capabilities to include granular investigation of cloud logs. So while Falco – which is used by more than 60% of the Fortune 500 – can detect and alert on real-time threats, Stratoshark offers a complementary, detailed event analysis, including the 'who, what, when, and where' of cloud activities. 'From Wireshark to Sysdig, Loris and I have been dedicated to helping people understand what's happening at the core of their systems,' said Combs, Sysdig Director of Open Source Projects. 'This donation is not only about making deep cloud workload visibility and forensics universally accessible, but also ensuring that Stratoshark has a solid legal foundation, something inaccessible to most open source projects. This ensures that the tool will live on through strong governance while also exposing it to a greater network of contributors.' What the Community is Saying 'Stratoshark represents a huge leap for the community, bringing the same deep packet-level insights we've had for traditional networks into the cloud-native world. With this donation, I'm excited to see more contributors jump in and shape the future of open source cloud forensics.' – Chris Greer, Network Analyst and Instructor at Packet Pioneer 'I've seen the power of open source security and community-driven development firsthand, especially when backed by organizations committed to building in the open. Stratoshark's donation to the Wireshark Foundation means that it can continue to evolve under the same transparent, collaborative model that has made Wireshark a generational powerhouse.' – Uli Heilmeier, Cybersecurity Architect at Krones, Stratoshark Core Developer, and Falco Contributor 'Stratoshark represents a significant advancement in cloud observability. Integrating it into the Wireshark Foundation aligns with our goal of fostering open source development and education, ensuring that powerful and unique tools like Stratoshark remain accessible and up to date for the broader community.' – Sheri Najafi, Executive Director at the Wireshark Foundation Save the Date to see Stratoshark Live in Conference SharkFest'25 US Open Source Summit North America in Denver, Colorado, June 23-25, 2025 SharkFest'25 E urope in Warsaw, Poland, Nov. 3-7, 2025 Resources About Sysdig In the cloud, every second counts. Attacks unfold in minutes and security teams must protect the business without slowing it down. Sysdig, named Customers' Choice in the Gartner® 'Voice of the Customer' report for cloud-native application protection platforms (CNAPPs), stops cloud attacks in seconds and instantly detects changes in risk with real-time insights and open source Falco. Sysdig Sage™, the industry's first AI cloud security analyst, uplevels human response and enables security, developers, and DevOps to work together, faster. By correlating signals across cloud workloads, identities, and services, Sysdig uncovers hidden attack paths and prioritizes real risk. From prevention to defense, Sysdig helps enterprises focus on what matters: innovation. Sysdig. Secure Every Second.

Why You Should Take an Ethical Hacking Course in Today's Digital World
Why You Should Take an Ethical Hacking Course in Today's Digital World

Time Business News

time12-05-2025

  • Business
  • Time Business News

Why You Should Take an Ethical Hacking Course in Today's Digital World

As the world becomes ever more reliant upon technology, cyber threats have become more dangerous, more frequent, and far more sophisticated. Data breaches, ransomware catastrophes, and phishing schemes that specifically target everyday users are on the rise – and so is the number of people needed to combat them. This is where ethical hacking comes in. If you want to make the switch to cybersecurity or learn new skills, enrolling in an ethical hacking course might be one of the best decisions you ever make. Let's look at why this training is not just relevant, but essential in the current age of technology. Ethical hacking, also known as white-hat hacking, is the legal practice of breaking into a system to identify and fix vulnerabilities. Ethical hackers use the same methods and types of exploits as bad hackers—but when they do it, they have permission and are working to improve security and not to undermine it. Ethical hackers will be able to stay one step ahead of attackers by understanding how the attacker thinks and operates, which allows ethical hackers to assist organizations in protecting their data, systems, and users from a cyber threat. Today's cyberattacks involve advanced tactics that may include zero-day exploits, deepfake scams, social engineering, and AI-based malware. Nothing has proven more effective in offsetting hackers' advantage than employing security professionals skilled enough to think like a hacker. To defeat hackers, cybersecurity teams must outthink, outsmart, or outweigh any advantage hackers have. An ethical hacking course will teach about assessing the risk, testing systems, and identifying vulnerabilities – all critical skills to support the new laws of cyberspace. Reports state that there are almost 3 million unfilled positions in the cybersecurity world. Organizations in every sector are searching for skilled people to identify threats and respond quickly. Ethical hacking skills are among the most wanted because it is using offense to enhance defense, a combination that very few candidates possess. Choosing to enroll in a course allows you to be ahead of the game and a valuable asset to any organization's security team. Ethical hacking positions pay competitively, offer job security, and room for advancement. CyberSeek identifies penetration tester, security analyst, and ethical hacker jobs as among the highest paid jobs in tech. You can improve your chances of getting hired by completing a recognized ethical hacking training course, offshore, or one recognized for preparing you for CEH (Certified Ethical Hacker) certification. Unlike many traditional IT courses, ethical hacking courses are hands-on and scenario-based. You'll learn to: Perform penetration testing Identify system weaknesses Use real-world tools like Metasploit, Burp Suite, and Wireshark Exploit vulnerabilities in simulated environments This practical approach ensures you're job-ready and able to apply your knowledge immediately. Every industry—finance, healthcare, retail, education, and even government—needs ethical hackers. This is because every sector is under cyber attack, and your skills are transferrable. It does not matter if you want to work for a small start up, a Fortune 500 company, or in the public sector, ethical hacking can offer you opportunities in all areas. You don't have to be a programming wizard to begin. These courses are designed for: IT professionals looking to specialize in cybersecurity looking to specialize in cybersecurity System administrators aiming to secure their networks aiming to secure their networks Students or recent graduates pursuing tech careers pursuing tech careers Cybersecurity beginners wanting to build a strong foundation wanting to build a strong foundation Ethical hacking enthusiasts who want to turn passion into profession Even if you're a business owner or decision-maker, taking a foundational course in ethical hacking can help you better understand the risks and security needs of your organization. To get the most out of your training, choose a course that offers: CEH certification preparation or direct CEH exam inclusion or direct CEH exam inclusion Lab-based, hands-on learning Updated content that reflects the latest threats and tools Guidance from experienced cybersecurity professionals Flexible learning formats—online, self-paced, or instructor-led Examples include EC-Council's official CEH certification course, as well as programs from platforms like Udemy, Coursera, Cybrary, and Offensive Security (OSCP for advanced learners). As cybercrime continues to evolve and become more damaging, the world needs professionals to fight back. An ethical hacking course does not only teach you how to defend networks, it also gives you the offensive knowledge to predict attacks and defend organizations from harm. If you're pursuing a career in cybersecurity, looking for a promotion or simply want to understand the digital world better, ethical hacking training is a proactive investment. Instead of waiting for the next big data breach to claim lives, be the person that protects and prevents it. TIME BUSINESS NEWS

NGN Center Hosts Transformative Event to Empower Bahraini Youth in Cybersecurity
NGN Center Hosts Transformative Event to Empower Bahraini Youth in Cybersecurity

Biz Bahrain

time09-02-2025

  • Business
  • Biz Bahrain

NGN Center Hosts Transformative Event to Empower Bahraini Youth in Cybersecurity

The NGN Training Center, in collaboration with the Computing Technology Industry Association (CompTIA), USA—a globally recognized authority in IT certifications—successfully hosted an engaging event titled 'CompTIA: Leading Cybersecurity' at its headquarters in the Bahrain World Trade Center. This initiative aimed to emphasize the critical importance of cybersecurity while encouraging Bahraini youth to seize exciting opportunities in this dynamic and fast-growing sector. The event featured distinguished speakers from CompTIA, alongside an insightful panel discussion with leading cybersecurity experts, including Mr. Hasan Muhi, Cybersecurity Expert; Mr. Hamad AlNakal, Security Researcher and Penetration Tester; and Mrs. Eman Ahmed, Cybersecurity Specialist. The session provided a platform for industry professionals to share their visions and experiences in the cybersecurity sector, discuss the key challenges faced by specialists in the field, and offer valuable guidance to aspiring young professionals looking to embark on careers in cybersecurity. The event included two interactive workshops provided participants with practical, hands-on learning experiences. The first workshop, 'Introduction to Cybersecurity Tools,' enabled attendees to explore essential tools such as Nmap for network scanning and vulnerability assessment, and Wireshark for packet analysis and network troubleshooting. The second workshop, 'Network Security,' focused on foundational network concepts, including TCP/IP and the OSI model, and delved into identifying common vulnerabilities such as port scanning and phishing. Participants learned to implement basic security measures, such as configuring firewalls and antivirus software, and engaged in a practical exercise using Nmap to perform network scans. Mr. Yaqoob Al Awadhi, CEO of NGN Group, expressed pride in the partnership with CompTIA, underscoring the significance of their globally recognized certifications, and stated, 'This collaboration reflects our commitment to providing Bahraini youth with world-class training programs that cover both fundamental and advanced technical areas, empowering them to thrive in an ever-evolving technological landscape.' Mr. Al Awadhi further highlighted that this event represents an essential step towards raising awareness about the importance of cybersecurity in Bahrain and guiding young talents to explore this vital field, which is a cornerstone of building a robust digital economy, and added, 'The event aligns with NGN's mission to meet the vocational education needs of individuals, contribute to sustainable development, and strengthen Bahrain's position as a leading regional technology hub.' Mr. Yaqoob Al Awadhi also reaffirmed NGN's dedication to introducing high-quality initiatives designed to empower Bahraini youth to excel in the IT sector, particularly in pivotal areas such as data protection and system security. These initiatives, as highlighted by Mr. Al Awadhi, align seamlessly with Bahrain's vision for fostering innovation and establishing leadership in technological advancements.

Will young developers take on key open source software?
Will young developers take on key open source software?

Yahoo

time27-01-2025

  • Yahoo

Will young developers take on key open source software?

Many of us have prepared instructions and critical information for our family in the event of our sudden demise. For Daniel Stenberg, that includes passwords for his Google and GitHub accounts. That's because he's the founder of curl, an open source internet transfer engine that has been downloaded billions of times and is used to transfer data to and from computer servers. It was first released by Mr Stenberg in 1996 and is now used by millions ever day. It's important that someone is able to maintain curl when he steps away. 'I just want to make sure that everything is there so the day I go away, someone can take over,' Mr Stenberg says. It's a problem confronting many of the open source software pioneers who transformed the technology world in the 1990s and early 2000s. Their ethos was that anyone could contribute to the development of an open source application or operating system – and the software and underlying code could be used, modified, and distributed for free. The open source movement broke the stranglehold of big technology companies, spurred innovation and underpins much of today's technology landscape. In 1999, Loris Degioanni made his first contributions to an open source network analysis tool that eventually became Wireshark, as part of his master's thesis. 'My concern was graduating,' he says, not succession planning or the long-term future of the project. Almost 30 years on, Mr Degioanni is now CTO and founder of cybersecurity firm Sysdig, which is a key sponsor of Wireshark. 'We're approaching the time when the founders of these early open source projects are starting to get old,' he says. While projects do come and go, he explains, some remain relevant over the years, and founders and maintainers usually want to ensure they live on while there is demand. That's not just because they've invested time in developing the code itself, but also because they have spawned communities, both virtual and in the real world. But while the likes of Mr Stenberg and Mr Degioanni can take action to ensure the keys to the kingdom are passed on, ensuring there is someone to pass them to can be a challenge. Many in the open source community worry there are not enough younger developers willing to get involved in contributing to or maintaining projects. This is often unpaid work afterall. Even Linus Torvalds, the creator of Linux, the operating system which kick-started the open source revolution in the early 1990s, noted at the Open Source Summit Europe in September that the 'kernel maintainers are aging'. Amanda Brock, CEO of OpenUK, a non-profit organization which represents the UK's open technology community, says younger developers might not appreciate the grip that closed software companies had in earlier decades. 'You've got a next generation who haven't engaged as a philanthropic community and volunteer community in the same way, at the same scale.' There are technology barriers to address too. Many key open source projects were originally written in C, a coding language first developed in the early 1970s. While C is still taught in universities, it is no longer widely used in the commercial world, Mr Degioanni explains. 'The fact that C is the main language makes it harder to attract a younger generation.' There are ways to work around this. Mr Degioanni says both Wireshark and another project he founded, Falco, rely on 'plug-ins', which can allow new functionality to be written in different languages. Mr Torvalds has given his blessing to the adoption of Rust as a programming language for Linux, while noting the 'Rust versus C discussion has taken almost religious overtones in certain areas.' When it comes to steering projects into the future, leaders and maintainers have the option of handing over control to foundations. The Cloud Native Computing Foundation, for example, oversees 208 projects, with more than 250,000 contributors. Wireshark has its own independent foundation, with Mr Degioanni as a board member. Not everyone subscribes to the foundation model. Stenberg and his collaborators have kept curl completely independent. 'I'm much better off without being in their neighbourhoods and just running my own neighbourhood,' he says. And foundations still face the issue of ensuring a steady supply of fresh developers to keep projects alive, he notes. Miss Brock says it's essential that the open source community consider how it encourages younger people to participate. This is about showing that while being a contributor can be challenging it's also career enhancing, giving young people an entry into established ecosystems and an opportunity to finesse and highlight their technical skills. 'It's a way to help STEM talent flight,' Miss Brock adds. 'Because people can work from home in the UK or whatever country they're in.' Degioanni is more sanguine. Even if there's 'probably less visceral enthusiasm' for the concept of open source, he says, the fundamental idea of being able to modify software is now a given. And, he continues, 'I've worked with open source my whole life. I've created my own projects. I've seen people join the projects that I created. I've seen people start their own open source projects.' Ultimately, he says, there is a 'joy, especially for a young person' in creating software, seeing it being used and sparking a community. 'That feeling doesn't get old,' he says. Even if the pioneers who popularized the earliest open source projects do. Inside Iceland's futuristic farm growing algae for food Sweden's green industry hopes hit by Northvolt woes Why is vintage audio equipment booming?

Will young developers take on key open source software?
Will young developers take on key open source software?

BBC News

time27-01-2025

  • BBC News

Will young developers take on key open source software?

Many of us have prepared instructions and critical information for our family in the event of our sudden demise. For Daniel Stenberg, that includes passwords for his Google and GitHub because he's the founder of curl, an open source internet transfer engine that has been downloaded billions of times and is used to transfer data to and from computer was first released by Mr Stenberg in 1996 and is now used by millions ever day. It's important that someone is able to maintain curl when he steps away.'I just want to make sure that everything is there so the day I go away, someone can take over,' Mr Stenberg says. It's a problem confronting many of the open source software pioneers who transformed the technology world in the 1990s and early ethos was that anyone could contribute to the development of an open source application or operating system – and the software and underlying code could be used, modified, and distributed for open source movement broke the stranglehold of big technology companies, spurred innovation and underpins much of today's technology 1999, Loris Degioanni made his first contributions to an open source network analysis tool that eventually became Wireshark, as part of his master's thesis. 'My concern was graduating,' he says, not succession planning or the long-term future of the 30 years on, Mr Degioanni is now CTO and founder of cybersecurity firm Sysdig, which is a key sponsor of Wireshark.'We're approaching the time when the founders of these early open source projects are starting to get old,' he says. While projects do come and go, he explains, some remain relevant over the years, and founders and maintainers usually want to ensure they live on while there is demand. That's not just because they've invested time in developing the code itself, but also because they have spawned communities, both virtual and in the real while the likes of Mr Stenberg and Mr Degioanni can take action to ensure the keys to the kingdom are passed on, ensuring there is someone to pass them to can be a in the open source community worry there are not enough younger developers willing to get involved in contributing to or maintaining projects. This is often unpaid work afterall. Even Linus Torvalds, the creator of Linux, the operating system which kick-started the open source revolution in the early 1990s, noted at the Open Source Summit Europe in September that the 'kernel maintainers are aging'.Amanda Brock, CEO of OpenUK, a non-profit organization which represents the UK's open technology community, says younger developers might not appreciate the grip that closed software companies had in earlier decades.'You've got a next generation who haven't engaged as a philanthropic community and volunteer community in the same way, at the same scale.'There are technology barriers to address too. Many key open source projects were originally written in C, a coding language first developed in the early C is still taught in universities, it is no longer widely used in the commercial world, Mr Degioanni explains. 'The fact that C is the main language makes it harder to attract a younger generation.' There are ways to work around this. Mr Degioanni says both Wireshark and another project he founded, Falco, rely on 'plug-ins', which can allow new functionality to be written in different Torvalds has given his blessing to the adoption of Rust as a programming language for Linux, while noting the 'Rust versus C discussion has taken almost religious overtones in certain areas.'When it comes to steering projects into the future, leaders and maintainers have the option of handing over control to foundations. The Cloud Native Computing Foundation, for example, oversees 208 projects, with more than 250,000 contributors. Wireshark has its own independent foundation, with Mr Degioanni as a board member. Not everyone subscribes to the foundation model. Stenberg and his collaborators have kept curl completely independent. 'I'm much better off without being in their neighbourhoods and just running my own neighbourhood,' he foundations still face the issue of ensuring a steady supply of fresh developers to keep projects alive, he Brock says it's essential that the open source community consider how it encourages younger people to is about showing that while being a contributor can be challenging it's also career enhancing, giving young people an entry into established ecosystems and an opportunity to finesse and highlight their technical skills.'It's a way to help STEM talent flight,' Miss Brock adds. 'Because people can work from home in the UK or whatever country they're in.' Degioanni is more sanguine. Even if there's 'probably less visceral enthusiasm' for the concept of open source, he says, the fundamental idea of being able to modify software is now a he continues, 'I've worked with open source my whole life. I've created my own projects. I've seen people join the projects that I created. I've seen people start their own open source projects.'Ultimately, he says, there is a 'joy, especially for a young person' in creating software, seeing it being used and sparking a community.'That feeling doesn't get old,' he says. Even if the pioneers who popularized the earliest open source projects do.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store