Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

iPad3 Details Leaked Ahead Of Announcement

Sometimes, I just have to satisfy my evil side. Although it would have been fun to get the scoop on the iPad3.

View Article


Image may be NSFW.
Clik here to view.

Measure effectively communicating value with three questions | Reconsidering...

“The problem with communication is that it is too ‘squishy’ to be measured. It’s just easier to focus on technical efforts with project plans.” This is an actual comment from a client about the...

View Article


Image may be NSFW.
Clik here to view.

Untangle Introduces New Appliance Line

Most powerful, usable multi-function firewall now available on an easy-deployment appliance. Sunnyvale, CA, March 07, 2012 – Untangle, Inc., a network software and appliance company, today announced...

View Article

Image may be NSFW.
Clik here to view.

Guess or Know?

Stanford, and other colleges, have started offering some courses online for free. You can see one such portal here. I have started one and a couple others are starting soon. Very good stuff. Anywho,...

View Article

Image may be NSFW.
Clik here to view.

The Causes of Mobile Application Risk

Mobile applications are often being built with no concern to security. How does this affect you and other users?

View Article


Image may be NSFW.
Clik here to view.

Facebook IPO Setting Stage for Cyber Security Disclosures

Given the recent guidance from the SEC on how public companies must include cyber security postures in their disclosures, many have been waiting to see how these companies would interpret this...

View Article

Image may be NSFW.
Clik here to view.

Wither Anonymous after the latest arrests?

It’s impossible to predict where loosely organized, pseudo-movement hacktivism goes from here, following the arrests of five people associated with LulzSec and Anonymous and a sixth person charged in...

View Article

Image may be NSFW.
Clik here to view.

What Does the iPad3 Mean for IT Security Teams?

With the launch of the iPad 3 today the trend of bring-your-own-device (BYOD), such as smartphones and tablets, to work shows no sign of abating. Hailed by many as a boon to worker productivity and a...

View Article


Image may be NSFW.
Clik here to view.

SBN Sponsor Post

Get a sneak peak into RSA Conference 2012 with podcasts from industry experts and speakers.http://bit.ly/fmaLXU

View Article


Image may be NSFW.
Clik here to view.

Apple Mountain Lion

What would you like to see here ? Comments allowed.

View Article

Image may be NSFW.
Clik here to view.

Cloud Security

What would you like to see here ? Comments allowed.

View Article

Image may be NSFW.
Clik here to view.

I was wrong, wrong, wrong, about McCain

You'd think that politics has nothing to do with cybersecurity, but it does. You can often guess a person's political leanings by their opinions on cybersecurity.For example, I'm a Libertarian. Because...

View Article

Image may be NSFW.
Clik here to view.

Core to Information Security is Monitoring Your Inputs and Outputs

Failure to consistently monitor traffic in and out of your network is not a technology problem, it's a process problem.

View Article


Image may be NSFW.
Clik here to view.

Are NIST’s Proposed SP 800-53 Additions Just Fad Controls?

We have all heard of the shortcoming of FISMA which ranges from poor compliance of infosec guidelines to poor reporting of the required controls for combating threats. With the collaboration of the...

View Article

Image may be NSFW.
Clik here to view.

5% of websites have had at least 1 SQL Injection vulnerability without...

During RSA Dave Aitel, CEO of Immunity, asked me a statistics question relating to website security. Dave asked, “What percentage of websites is WhiteHat seeing as vulnerable to SQL Injection —...

View Article


Image may be NSFW.
Clik here to view.

CanSecWest

I always look forward to CanSecWest.  Usually cutting edge stuff.  Some of it incomprehensible, some of it interesting, some very entertaining. Every year is a different program, of course, but every...

View Article

Image may be NSFW.
Clik here to view.

Some Snort discussion about Murofet, Kazy, or whatever we’re calling it..

One of the fun parts about malware analysis is the name you give it.  I try to name my coverage in ClamAV similar to what other vendors are naming the same samples so there is some correlation and...

View Article


Image may be NSFW.
Clik here to view.

Social Networks: The Good and The Bad

Yesterday, I gave a presentation for the Beltug Security SIG (“Special Interest Group“) about the usage of social networks in companies, the risks associated to them and how to reduce/avoid them....

View Article

Image may be NSFW.
Clik here to view.

Congrats to UNC Charlotte

  I had the chance to hang out at the SECCDC yesterday at Kennesaw State Univ.  For those not familiar with these events (I wasn’t either, until yesterday), you have colleges who bring in teams to...

View Article

Image may be NSFW.
Clik here to view.

The problem of Securing the New iPad 3 within Business

Apple announced the latest edition of their fantastic iPad today, not only is this device irresistible for consumers, but it has become irresistible for business.  This presents a new challenge for...

View Article
Browsing all 37364 articles
Browse latest View live