Dome9 Security Launches Industry’s First Free Cloud Security
New Dome9 Lite Cloud Service Secures Access to An Unlimited Number of Servers and Clouds SAN MATEO, Calif. – March 7, 2012 – Dome9 Security™, the leading provider of cloud security firewall management...
View ArticleNow there’s no excuse not to Secure Your Cloud™
Introducing Dome9 Lite Cloud – 100% Free Security for Any Server in Any Cloud First off – yes, it’s free. And not just for one server or a few dozen… it’s free for an unlimited number of servers. There...
View ArticleSBN Sponsor Post
RSA Conference US 2012 keynote lineup announced. Tony Blair to give closing keynote address.http://bit.ly/wrm3Aw
View ArticleVolkswagen wants you to know that its website hasn’t been hacked
The general public's awareness of website hacking has reached incredible levels if it's now being used as a joke by advertisers.
View ArticleKandel on Memory and Identity
The NYT gives an interesting example of how identity fits with memory in a an interview of Nobel Prize-winning neuroscientist Dr. Kandel: So what’s the biggest problem in psychoanalysis? It’s memory!...
View ArticleSophos Research Reveals CIO Concerns Over Mobile Data Security
Less than a quarter of UK CIOs feel data on mobile devices would be secure if devices are lost or stolen
View ArticleFishing phishing
I just got one of the most unusual spam messages ever. Here's what part of it said: We are currently in need of the following worker for our company here in United States The American Fish and Seafood...
View ArticleSouth Korean Firm Offers New Government Grade Cloud-Based Antivirus Solutions
AhnLab V3 Secure Cloud offers anti-hacking, anti-phishing and PC optimization
View ArticleLocaid’s Patented GeoFence Verifies Gamer’s Location
Location-service provider meets requirements of the Nevada Gaming Control Board
View ArticleSafe Coding and Software Security Infographic
The need for secure application coding is greater than ever! Application security requirements are heightening in the wake of critical application breaches, meaning knowledge and training must rise to...
View ArticleNew Event & Job Submission Forms
As most people know we’ve always provided a vetted list of events in the area but recently we also started posting job opportunities we think you might be interested in. In the various event and job...
View ArticleDerailed
Fascinating screed, via ArsTechnica’s Dan Goodin, of the Ruby On Rails powered GitHub crack; and as is typical, the databases which supply the site’s code control were consequently compromised; in...
View ArticleSecurity Guru Tells Tale of How His Blog Became a Botnet Server
It's important for security gurus to admit to their mistakes. It humanizes them especially when that's often the most important part of security.
View ArticleEpisode 100 Tonight!!
Join us as we have two very special guests to help us celebrate our 100th episode! Harlan Carvey joins us to talk about his latest book, Windows Forensic Analysis Toolkit, Third Edition: Advanced...
View ArticleIs Facebook preventing critics from downloading their account data?
Do you want to leave Facebook? Some departing users are claiming that the social network simply doesn't want to say goodbye to their data..
View ArticleProject Zosimos – Defining success for Information Security through KPIs
I've been a measure it kind of guy since shortly after taking a role at General Electric almost a decade ago. In a culture where everything is scorecards and metrics I quickly learned that proof...
View ArticleInsuring Privacy in the Era of BYOD
With the rise of bring your own device (BYOD) in the workplace a lot of IT people suddenly have a lot of visibility into personal data residing on devices that connect to the corporate network....
View ArticleTenable Network Security Podcast Episode 115 – "Hacking sprinklers,...
Welcome to the Tenable Network Security Podcast Episode 115 Hosts Paul Asadoorian, Product Evangelist Carlos Perez, Lead Vulnerability Researcher Ron Gula, CEO/CTO Announcements Tenable had a great...
View Article