SANSFIRE 2012 is coming to Washington, DC
SANSFIRE 2012 will take place at our Hilton Washington and Towers campus, July 6-15. There will be more than 40 SANS IT Security Training courses available. This training event is powered by the (ISC)...
View ArticleTenable Network Security Podcast Episode 118 – "Detect jailbroken devices,...
Welcome to the Tenable Network Security Podcast Episode 118 Announcements Predicting Attack Paths - Tenable has published a technical paper titled "Predicting Attack Paths." The paper describes how to...
View ArticleConsolidation in Healthcare – What can we learn from it in IAM?
A few months ago, I wrote a few blogs about trends in Healthcare and why these were making Identity a top of mind issue in the Healthcare sector. As we continue to work with clients in Healthcare, we...
View ArticleFriday Summary: April 6, 2012
Rich here… Normally I like to open the Summary with a bit of something from my personal life. Some sort of anecdote with a message. In other words, I blatantly ripped off Mike’s format for the...
View ArticleUpdate 3: Is the number accurate? Why is this a big deal? What's the botnet...
Update 3: Is the number accurate? Why is this a big deal? What's the botnet doing? #ITBW +Computerworld
View ArticleMore about the Flashback botnet
I can’t help but notice that there are many more people than usual hitting this blog, this week, nearly all looking at articles related to Flashback and the Java updates. (For those looking at the...
View ArticleNew iPad Wi-Fi not working? You're not alone. #ITBW for +Computerworld $AAPL
New iPad Wi-Fi not working? You're not alone. #ITBW for +Computerworld $AAPL
View ArticleApril 2012 Free Giveaway Sponsor – eLearnSecurity
Win Penetration Testing Professional v2 Course by eLS!! On March 21, 2012 eLearnSecurity released a drastically improved verion of the course materials for their professional-level training course,...
View ArticleParting shot: mac zealotry blowback
At last, some Mac zealotry blowback. After decades of receiving ”la-la-la-la-not-listening” abuse when it reports Mac malware, however objectively, the AV industry now turns out to be at fault for the...
View ArticleDuh: The New Mac Virus
Lots of coverage on the Flashback Trojan. But most of the stories are missing the point. Though having a Mac virus is newsworthy, the real point is the inefficacy of antivirus. Antivirus hardly has a...
View ArticleWatching the Watchers: Enforce Entitlements
So far we have described the Restrict Access and Protect Credentials aspects of the Privileged User Lifecycle. So far any administrator managing a device is authorized to be there and uses strong...
View ArticleAutomation And Misguided IT Security Strategy Threaten Industry
Several security industry heavyweights flexed their muscle and star power to warn attendees of the 2012 InfoSec World Conference and Expo that relying on technology alone to secure networks is a...
View ArticleFireAMP Outbreak Control – A Recourse Against Malware (DEMO)
We have made no secret of the hard work that Sourcefire has put into the development of FireAMP. And we have done this in the hopes that it will actually remove some of the hard work from the lives of...
View ArticleWeekly News Roundup
Happy Friday! Here’s what was big in cyber security headlines this week. Enjoy! Global Payments breach: “Up to 1.5 million Visa, MasterCard credit card numbers stolen” by Emil Protalinski...
View ArticleGet over it, BYOD is here for good
Like the scene of a movie in which a biblical character holds back the mighty sea and is about to release the tide against his foes, BYOD has become a force of nature poised to flood those charged with...
View ArticleImmortality and the Internet: what happens when you die?
Yesterday during a discussion to plan the forward programme of the EURIM Information and Identity Governance group it was pointed out that you need to include your passwords with your will to enable...
View ArticleLazy Friday? Maybe next time
Some of you may think that Friday (especially the afternoon) is an informal prequel to the weekend relaxation. As such, it should be devoted to putting legs high up on the desk and drinking long drinks...
View ArticleHack Naked TV Episode 30
In this edition of Hack Naked TV we demonstrate a Apple Mac getting compromised. Share it with friends and family.. They have to know. We also talk about Nortel going bankrupt and how the TSA is trying...
View ArticleTop 3 NoVA Infosec Blog Posts of the Week
It’s that time of the week again: the time where we take a look at what local security bloggers have been up to. You can take a look at what local security bloggers have been up to but if you can’t...
View ArticleRSA Conference Friday Five – April 6, 2012
For those that attended movie night at RSA Conference 2012, this week’s Friday Five should bring back a few “Live Free or Die Hard” memories. Most notably so is the inside-look at the Department of...
View Article