Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

MANAGE RISK BEFORE IT DAMAGES YOU: PART TWO…

View Article


Image may be NSFW.
Clik here to view.

Google has $1 million to Give Away, with HP's Help #HPIO UKSecurity is a top...

Google has $1 million to Give Away, with HP's Help #HPIO UKSecurity is a top priority for every organization; Google is no exception. On Monday the company announced on its Chromium Blog that it’s put...

View Article


Image may be NSFW.
Clik here to view.

Google has $1 million to Give Aw…

Google has $1 million to Give Away, with HP's Help #HPIO UKSecurity is a top priority for every organization; Google is no exception. On Monday the company announced on its Chromium Blog that it’s put...

View Article

Image may be NSFW.
Clik here to view.

Naked Security wins Best Corporate Blog award at RSA

The Social Security Blogger Awards was held once again at RSA in San Francisco last week and Naked Security is proud to have taken home another trophy.

View Article

Image may be NSFW.
Clik here to view.

Enterprise security’s Achilles heel – the human/password problem

Sometimes a headline makes you want to run head-first into a hard surface.  "Password1 is the No. 1 password employed by business users" makes my head hurt in ways I can't even begin to explain.  I...

View Article


Image may be NSFW.
Clik here to view.

TED 2012: Kumars’ Contraptions

View Article

Image may be NSFW.
Clik here to view.

Beginnings

View Article

Image may be NSFW.
Clik here to view.

SBN Sponsor Post

Follow RSA Conference on Twitter http://bit.ly/aUHdtm

View Article


Image may be NSFW.
Clik here to view.

RSA 2012: Hellman on Privacy

View Article


Image may be NSFW.
Clik here to view.

SSCC 84.66 – RSA conclusion, award winners, HB Gary and big data

Chet and Duck say goodbye to San Francisco, thank their fellow bloggers for Naked Security winning the Best Corporate Security Blog, discuss their favorite stand and talk a bit about how "big data"...

View Article

Image may be NSFW.
Clik here to view.

New Mass Injection Wave of WordPress Websites on the Prowl

  The Websense® ThreatSeeker® Network has detected a new wave of mass-injections of a well-known exploit that we've been following in Security LabsTM for months. The majority of targets are Web sites...

View Article

Image may be NSFW.
Clik here to view.

Information Security Disconnect: RSA, USB, AV, and reality

The world's largest information security event, the annual RSA Conference, is over for another year. Most of the more than 18,000 people who attended the 2012 gathering are probably back home now,...

View Article

Image may be NSFW.
Clik here to view.

RSAC 2012: Malware growth and why layered security is still king

Last week during the RSA Conference, there was plenty of talk about growth.

View Article


Image may be NSFW.
Clik here to view.

RSAC 2012: BYOD isn’t coming – it’s here and you can’t stop it

Bring Your Own Device – it’s a seemingly spooky term that was repeated across the show floor last week during the RSA Conference in San Francisco.

View Article

Image may be NSFW.
Clik here to view.

RSAC 2012: Lost or unclaimed devices pose risk to corporate data

After a long week of meetings and tradeshow fun, it’s time to catch-up on missed emails and sort the vast amount of business cards that were collected during the 2012 RSA Conference.

View Article


Image may be NSFW.
Clik here to view.

Is InfoSec Ready for Big Data?

"Big Data" is definitely all the buzz. The question is are you ready and is the security industry ready to take advantage of it?

View Article

Image may be NSFW.
Clik here to view.

Experts avoid AV because they can – the rest of you should still use it

Wired published an interesting article on Friday.

View Article


Image may be NSFW.
Clik here to view.

Review and Critique of Generally Accepted Privacy Principles — Part 2

2. Critique 2.1. GAPP’s Definition of Privacy GAPP Approach: The AICPA and CICA define privacy as “the rights and obligations of individuals and organizations with respect to the collection, use,...

View Article

Image may be NSFW.
Clik here to view.

iPad 3 (or 2S or HD) is "thicker" — really? #ITBW Before the iPad 3 release...

iPad 3 (or 2S or HD) is "thicker" -- really? #ITBW Before the iPad 3 release date (err, iPad 2S? iPad HD?), Chinese bloggers have assembled several parts, to show us what the new Apple (NASDAQ:AAPL)...

View Article

Image may be NSFW.
Clik here to view.

CEE-enhanced syslog defined

CEE-enhanced syslog is an upcoming standard for expressing structured data inside syslog messages. It is a cross-platform effort that aims at making log analysis (and log processing in general) much...

View Article
Browsing all 37364 articles
Browse latest View live