Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

SANSFIRE 2012 is coming to Washington, DC

SANSFIRE 2012 will take place at our Hilton Washington and Towers campus, July 6-15. There will be more than 40 SANS IT Security Training courses available. This training event is powered by the (ISC)...

View Article


Image may be NSFW.
Clik here to view.

Tenable Network Security Podcast Episode 118 – "Detect jailbroken devices,...

Welcome to the Tenable Network Security Podcast Episode 118 Announcements Predicting Attack Paths - Tenable has published a technical paper titled "Predicting Attack Paths." The paper describes how to...

View Article


Image may be NSFW.
Clik here to view.

Consolidation in Healthcare – What can we learn from it in IAM?

A few months ago, I wrote a few blogs about trends in Healthcare and why these were making Identity a top of mind issue in the Healthcare sector. As we continue to work with clients in Healthcare, we...

View Article

Image may be NSFW.
Clik here to view.

Friday Summary: April 6, 2012

Rich here… Normally I like to open the Summary with a bit of something from my personal life. Some sort of anecdote with a message. In other words, I blatantly ripped off Mike’s format for the...

View Article

Image may be NSFW.
Clik here to view.

Update 3: Is the number accurate? Why is this a big deal? What's the botnet...

Update 3: Is the number accurate? Why is this a big deal? What's the botnet doing? #ITBW +Computerworld

View Article


Image may be NSFW.
Clik here to view.

More about the Flashback botnet

I can’t help but notice that there are many more people than usual hitting this blog, this week, nearly all looking at articles related to Flashback and the Java updates. (For those looking at the...

View Article

Image may be NSFW.
Clik here to view.

New iPad Wi-Fi not working? You're not alone. #ITBW for +Computerworld $AAPL

New iPad Wi-Fi not working? You're not alone. #ITBW for +Computerworld $AAPL

View Article

Image may be NSFW.
Clik here to view.

April 2012 Free Giveaway Sponsor – eLearnSecurity

Win Penetration Testing Professional v2 Course by eLS!! On March 21, 2012 eLearnSecurity released a drastically improved verion of the course materials for their professional-level training course,...

View Article


Image may be NSFW.
Clik here to view.

Parting shot: mac zealotry blowback

At last, some Mac zealotry blowback. After decades of receiving ”la-la-la-la-not-listening” abuse when it reports Mac malware, however objectively, the AV industry now turns out to be at fault for the...

View Article


Image may be NSFW.
Clik here to view.

Duh: The New Mac Virus

Lots of coverage on the Flashback Trojan. But most of the stories are missing the point. Though having a Mac virus is newsworthy, the real point is the inefficacy of antivirus. Antivirus hardly has a...

View Article

Image may be NSFW.
Clik here to view.

Watching the Watchers: Enforce Entitlements

So far we have described the Restrict Access and Protect Credentials aspects of the Privileged User Lifecycle. So far any administrator managing a device is authorized to be there and uses strong...

View Article

Image may be NSFW.
Clik here to view.

Automation And Misguided IT Security Strategy Threaten Industry

Several security industry heavyweights flexed their muscle and star power to warn attendees of the 2012 InfoSec World Conference and Expo that relying on technology alone to secure networks is a...

View Article

Image may be NSFW.
Clik here to view.

FireAMP Outbreak Control – A Recourse Against Malware (DEMO)

We have made no secret of the hard work that Sourcefire has put into the development of FireAMP. And we have done this in the hopes that it will actually remove some of the hard work from the lives of...

View Article


Image may be NSFW.
Clik here to view.

Weekly News Roundup

Happy Friday! Here’s what was big in cyber security headlines this week. Enjoy! Global Payments breach: “Up to 1.5 million Visa, MasterCard credit card numbers stolen” by Emil Protalinski...

View Article

Image may be NSFW.
Clik here to view.

Get over it, BYOD is here for good

Like the scene of a movie in which a biblical character holds back the mighty sea and is about to release the tide against his foes, BYOD has become a force of nature poised to flood those charged with...

View Article


Image may be NSFW.
Clik here to view.

Immortality and the Internet: what happens when you die?

Yesterday during a discussion to plan the forward programme of the EURIM Information and Identity Governance group it was pointed out that you need to include your passwords with your will to enable...

View Article

Image may be NSFW.
Clik here to view.

Lazy Friday? Maybe next time

Some of you may think that Friday (especially the afternoon) is an informal prequel to the weekend relaxation. As such, it should be devoted to putting legs high up on the desk and drinking long drinks...

View Article


Image may be NSFW.
Clik here to view.

Hack Naked TV Episode 30

In this edition of Hack Naked TV we demonstrate a Apple Mac getting compromised. Share it with friends and family.. They have to know. We also talk about Nortel going bankrupt and how the TSA is trying...

View Article

Image may be NSFW.
Clik here to view.

Top 3 NoVA Infosec Blog Posts of the Week

It’s that time of the week again: the time where we take a look at what local security bloggers have been up to. You can take a look at what local security bloggers have been up to but if you can’t...

View Article

Image may be NSFW.
Clik here to view.

RSA Conference Friday Five – April 6, 2012

For those that attended movie night at RSA Conference 2012, this week’s Friday Five should bring back a few “Live Free or Die Hard” memories. Most notably so is the inside-look at the Department of...

View Article
Browsing all 37364 articles
Browse latest View live