iPad3 Details Leaked Ahead Of Announcement
Sometimes, I just have to satisfy my evil side. Although it would have been fun to get the scoop on the iPad3.
View ArticleMeasure effectively communicating value with three questions | Reconsidering...
“The problem with communication is that it is too ‘squishy’ to be measured. It’s just easier to focus on technical efforts with project plans.” This is an actual comment from a client about the...
View ArticleUntangle Introduces New Appliance Line
Most powerful, usable multi-function firewall now available on an easy-deployment appliance. Sunnyvale, CA, March 07, 2012 – Untangle, Inc., a network software and appliance company, today announced...
View ArticleGuess or Know?
Stanford, and other colleges, have started offering some courses online for free. You can see one such portal here. I have started one and a couple others are starting soon. Very good stuff. Anywho,...
View ArticleThe Causes of Mobile Application Risk
Mobile applications are often being built with no concern to security. How does this affect you and other users?
View ArticleFacebook IPO Setting Stage for Cyber Security Disclosures
Given the recent guidance from the SEC on how public companies must include cyber security postures in their disclosures, many have been waiting to see how these companies would interpret this...
View ArticleWither Anonymous after the latest arrests?
It’s impossible to predict where loosely organized, pseudo-movement hacktivism goes from here, following the arrests of five people associated with LulzSec and Anonymous and a sixth person charged in...
View ArticleWhat Does the iPad3 Mean for IT Security Teams?
With the launch of the iPad 3 today the trend of bring-your-own-device (BYOD), such as smartphones and tablets, to work shows no sign of abating. Hailed by many as a boon to worker productivity and a...
View ArticleSBN Sponsor Post
Get a sneak peak into RSA Conference 2012 with podcasts from industry experts and speakers.http://bit.ly/fmaLXU
View ArticleI was wrong, wrong, wrong, about McCain
You'd think that politics has nothing to do with cybersecurity, but it does. You can often guess a person's political leanings by their opinions on cybersecurity.For example, I'm a Libertarian. Because...
View ArticleCore to Information Security is Monitoring Your Inputs and Outputs
Failure to consistently monitor traffic in and out of your network is not a technology problem, it's a process problem.
View ArticleAre NIST’s Proposed SP 800-53 Additions Just Fad Controls?
We have all heard of the shortcoming of FISMA which ranges from poor compliance of infosec guidelines to poor reporting of the required controls for combating threats. With the collaboration of the...
View Article5% of websites have had at least 1 SQL Injection vulnerability without...
During RSA Dave Aitel, CEO of Immunity, asked me a statistics question relating to website security. Dave asked, “What percentage of websites is WhiteHat seeing as vulnerable to SQL Injection —...
View ArticleCanSecWest
I always look forward to CanSecWest. Usually cutting edge stuff. Some of it incomprehensible, some of it interesting, some very entertaining. Every year is a different program, of course, but every...
View ArticleSome Snort discussion about Murofet, Kazy, or whatever we’re calling it..
One of the fun parts about malware analysis is the name you give it. I try to name my coverage in ClamAV similar to what other vendors are naming the same samples so there is some correlation and...
View ArticleSocial Networks: The Good and The Bad
Yesterday, I gave a presentation for the Beltug Security SIG (“Special Interest Group“) about the usage of social networks in companies, the risks associated to them and how to reduce/avoid them....
View ArticleCongrats to UNC Charlotte
I had the chance to hang out at the SECCDC yesterday at Kennesaw State Univ. For those not familiar with these events (I wasn’t either, until yesterday), you have colleges who bring in teams to...
View ArticleThe problem of Securing the New iPad 3 within Business
Apple announced the latest edition of their fantastic iPad today, not only is this device irresistible for consumers, but it has become irresistible for business. This presents a new challenge for...
View Article