Guest Post: King Canute Holds Back the Tablets: Why Keeping Mobile Devices...
By Dave Martin, Senior Manager, Cyber Security, Logica Business Consulting King Canute was sitting in the palace one day giving dictation to his scribe, Arthur, whence he noticed that the scribe was no...
View ArticlePractical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Just got a copy of Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. For many people, malware analysis means running an anti-virus software scan on their desktop and...
View ArticleThe Tyranny of Progress: Is "The Latest and Greatest" Worth the Upgrade?...
The Tyranny of Progress: Is "The Latest and Greatest" Worth the Upgrade? #HPIO UKby +Dave Taylor...
View ArticleSBN Sponsor Post
Share your best advice with us – tell us the best advice you’ve ever received, heard or given.http://bit.ly/xbdT9q
View ArticleNetflix To Customers, Screw Your Privacy
I have Netflix. I know a lot of people who use it. But, I know I’d rather not have people knowing what my family is watching per se. None of their damn business. Netflix has a differing opinion. So...
View ArticleUsing Data to Secure Data – Observations from the RSA Conference
It seems that each year I attend the RSA Security Conference there is always a set of theme words permeating the conference. Some of the more recent ones: borderless, cloud, mobile, compliance, etc....
View ArticleOops. There's a missed opportunity, +The Daily Show and +Comedy Central...
Oops. There's a missed opportunity, +The Daily Show and +Comedy Central #sadtromboneStill, great segment.
View ArticleOops, a missed opportunity, +The Daily Show and +Comedy Central. #sadtrombone...
Oops, a missed opportunity, +The Daily Show and +Comedy Central. #sadtrombone Still, great segment.www.BarbaraBoxerRuinsTheDailyShow.com
View ArticleRSAC 2012 Microcast: SecureWorks
Dell SecureWorks Chief Technology Officer Jon Ramsey took a few minutes out of his day at the RSA Conference to talk to me about a new study his team had recently written on series of attacks they...
View ArticleBring your own: practical advice for handling smartphones in the workplace
If you work in IT, you’ve probably been here already. Someone important is proudly clutching a shiny new toy and asking you that vague, difficult question: "Can I use this?". So how do you respond?
View ArticleActive and Passive Auditing of DNS Servers in Use – Finding DNSChanger Malware
Tenable’s Research team recently shipped a variety of plugins for Nessus and the Passive Vulnerability Scanner (PVS) that audit and detect the DNS servers in use on (and off) your network. These...
View ArticleDoubleplusgood security
When information security people sit around and drink beer, the topic of the worst blunders that they've ever seen often comes up, and I had more than a couple of these discussions at this year's RSA...
View ArticleWeek 9 in Review – 2012
Event Related RSA Conference 2012 RSA Conference 2012: Stress and burnout in infosec careers- csoonline.com IT security professionals are experiencing extreme levels of stress and burnout, but they...
View ArticleFishbowl, The NSA Mobility Program
News, of the latest implementation of secure mobile communications and computation via the National Security Agency [NSA]. Targeting the Google Inc. (NasdaqGS: GOOG) Android platform the NSA is...
View ArticleIntersections Inc. Advises Taxpayers on How To Protect Themselves From...
In years past, fraudsters have used a number of methods to steal or obtain personal information
View ArticleCloudpaging Startup Numecent Emerges From Stealth
Cloudpaging reduces the digital delivery time of any native software and other non-linear content
View ArticleMemories of the Michelangelo virus
Where were you on March 6th 1992? Graham Cluley goes back in his time machine, and remembers the story of the biggest virus scare of all time - Michelangelo!
View Articlewhois smarter than I thought?
Whilst picking through the responses to the latest Spy Hunter challenge I stumbled over some interesting behaviour when using whois to query various kinds of IPv6 addresses, especially those related to...
View ArticleRSA Conference 2012
RSA 2012 was my first RSA. I used a vendor code to get an expo-only pass. I’ll be attending again since it’s a good chance to visit vendors, customers, prospects and online buddies in a short amount of...
View Article