Google has $1 million to Give Away, with HP's Help #HPIO UKSecurity is a top...
Google has $1 million to Give Away, with HP's Help #HPIO UKSecurity is a top priority for every organization; Google is no exception. On Monday the company announced on its Chromium Blog that it’s put...
View ArticleGoogle has $1 million to Give Aw…
Google has $1 million to Give Away, with HP's Help #HPIO UKSecurity is a top priority for every organization; Google is no exception. On Monday the company announced on its Chromium Blog that it’s put...
View ArticleNaked Security wins Best Corporate Blog award at RSA
The Social Security Blogger Awards was held once again at RSA in San Francisco last week and Naked Security is proud to have taken home another trophy.
View ArticleEnterprise security’s Achilles heel – the human/password problem
Sometimes a headline makes you want to run head-first into a hard surface. "Password1 is the No. 1 password employed by business users" makes my head hurt in ways I can't even begin to explain. I...
View ArticleSSCC 84.66 – RSA conclusion, award winners, HB Gary and big data
Chet and Duck say goodbye to San Francisco, thank their fellow bloggers for Naked Security winning the Best Corporate Security Blog, discuss their favorite stand and talk a bit about how "big data"...
View ArticleNew Mass Injection Wave of WordPress Websites on the Prowl
The Websense® ThreatSeeker® Network has detected a new wave of mass-injections of a well-known exploit that we've been following in Security LabsTM for months. The majority of targets are Web sites...
View ArticleInformation Security Disconnect: RSA, USB, AV, and reality
The world's largest information security event, the annual RSA Conference, is over for another year. Most of the more than 18,000 people who attended the 2012 gathering are probably back home now,...
View ArticleRSAC 2012: Malware growth and why layered security is still king
Last week during the RSA Conference, there was plenty of talk about growth.
View ArticleRSAC 2012: BYOD isnt coming its here and you cant stop it
Bring Your Own Device – it’s a seemingly spooky term that was repeated across the show floor last week during the RSA Conference in San Francisco.
View ArticleRSAC 2012: Lost or unclaimed devices pose risk to corporate data
After a long week of meetings and tradeshow fun, it’s time to catch-up on missed emails and sort the vast amount of business cards that were collected during the 2012 RSA Conference.
View ArticleIs InfoSec Ready for Big Data?
"Big Data" is definitely all the buzz. The question is are you ready and is the security industry ready to take advantage of it?
View ArticleExperts avoid AV because they can – the rest of you should still use it
Wired published an interesting article on Friday.
View ArticleReview and Critique of Generally Accepted Privacy Principles — Part 2
2. Critique 2.1. GAPP’s Definition of Privacy GAPP Approach: The AICPA and CICA define privacy as “the rights and obligations of individuals and organizations with respect to the collection, use,...
View ArticleiPad 3 (or 2S or HD) is "thicker" — really? #ITBW Before the iPad 3 release...
iPad 3 (or 2S or HD) is "thicker" -- really? #ITBW Before the iPad 3 release date (err, iPad 2S? iPad HD?), Chinese bloggers have assembled several parts, to show us what the new Apple (NASDAQ:AAPL)...
View ArticleCEE-enhanced syslog defined
CEE-enhanced syslog is an upcoming standard for expressing structured data inside syslog messages. It is a cross-platform effort that aims at making log analysis (and log processing in general) much...
View Article