Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Smartphone vulnerabilities

Scott Kelly, platform architect at Netflix, gets to look at a lot of devices.  In depth.  He’s got some interesting things to say about smartphones.  (At CanSecWest.) First of all, with a computer, you...

View Article


Image may be NSFW.
Clik here to view.

Importance For Healthcare Security Pros To “Speak” Finance

As the number of healthcare data breaches continues to snowball, executives put in charge of safeguarding protected health information (PHI) can’t keep up with the risks inherent with increased...

View Article


Image may be NSFW.
Clik here to view.

Building a Data Science Practice for Better Risk Management

The next stage of shared incident reporting and collaborative Big Data for true data sciences. Are you ready for it?

View Article

Image may be NSFW.
Clik here to view.

SBN Sponsor Post

Share your best advice with us – tell us the best advice you’ve ever received, heard or given.http://bit.ly/xbdT9q

View Article

Image may be NSFW.
Clik here to view.

Thought paper on Domain Name Seizures

On behalf of the ICANN Security Team, I've written a paper that offers guidelines for anyone who prepares or contributes to the preparation of legal orders that include domain name seizuress,...

View Article


Image may be NSFW.
Clik here to view.

Probing mobile (cell) networks

Mobile networks have many disparate types of devices.  You can probably guess what some of them are, or even go to the provider’s store or kiosk and get a list.  But there are going to be more devices...

View Article

Image may be NSFW.
Clik here to view.

.rr.nu Malware Campaign – More Details

We are getting lots of questions about the latest mass compromise targeting WordPress sites (redirecting to fake AV) that has affected over 30,000 domains. The first question is how are these sites...

View Article

Image may be NSFW.
Clik here to view.

Being Stealthy with DGA Technology

Do you remember all the fuss about Conficker many moons ago and its odd method of locating C&C servers? Instead of relying upon a static list of preconfigured domain names that corresponded to the...

View Article


Image may be NSFW.
Clik here to view.

Virtual Execution and the Emperors New Clothes

Some ideas sound so attractive in principle that it’s hard to fathom why the Internet security industry hasn’t leapt up and down all over them already. Take for instance the idea of automatically...

View Article


Image may be NSFW.
Clik here to view.

Tips for Launching Your Security Startup

For startups to succeed, they can't go it alone. They need to be part of the larger security ecosystem.

View Article

Image may be NSFW.
Clik here to view.

Video: RSA Conference 2012 : PechaKucha : Security Déjà Vu

So, here is a funny story. This past fall, my team came to me and said “hey, do we want to sponsor powered by PechaKucha night at RSA Conference 2012?” I vaguely recalled catching the tail end of this...

View Article

Image may be NSFW.
Clik here to view.

March 2012 ISSA-Be Chapter Meeting Wrap-Up

This week is a very busy week! After the OWASP & Beltug meetings, I attended the ISSA Brussels Chapter Meeting tonight. Two excellent speakers (and friends) were invited to talk about their...

View Article

Image may be NSFW.
Clik here to view.

6 Quick Steps for N00bs Understanding Risk Assessments

Although this article came out a few months ago I’ve been meaning to put it out there as it may give those unfamiliar with addressing risk a good overview of what’s involved. In this case study the...

View Article


Image may be NSFW.
Clik here to view.

Risk Management Priorities Change Given Job Responsibilities

Just change jobs and you'll have a completely different perspective of what are the most important assets in your company and what's at risk.

View Article

Image may be NSFW.
Clik here to view.

Target NYC: Simulated SCADA Attack Contemplated

News, via Bloomberg’s Eric Engleman and Chris Strohm in Washington, D.C., detailing the contemplated SCADA security exercise, targeting the New York City w grid. Focusing on a simulated attack, during...

View Article


Image may be NSFW.
Clik here to view.

The Brads: Windows 8

via the comic genius of Brad Colbow at bradcolbow.com

View Article

Image may be NSFW.
Clik here to view.

InfoSec Daily Podcast Episode 614

Episode 614 - PwnedSauce, Odd Targets, WormPress Fake A/V, P2P Botnet and Body Scanner Bypass

View Article


Image may be NSFW.
Clik here to view.

Today’s Genius, Tomorrow’s Scientist

Behold: Ladies and Gentlemen, Girls and Boys, the outstanding and brilliant engineering efforts of Miss Audri Clemmons; whom, interestingly, exhibits the most astounding execution of Scientific Method...

View Article

Image may be NSFW.
Clik here to view.

"Protecting Privileged Domain Accounts: Disabling Encrypted Passwords"

[Author's Note: This is the 3nd in a multi-part series on the topic of "Protecting Privileged Domain Accounts". My primary goal is to help incident responders protect their privileged accounts when...

View Article

Image may be NSFW.
Clik here to view.

Hacking Displays Made Easy

Displays are monitors, right?  Strictly output, right? Wrong. DVI and HDMI both support DDC, which allows for display identification and “capability advertisement.”  In other words, the display is...

View Article
Browsing all 37364 articles
Browse latest View live