Stop Google recording your chats
Many Gmail users also use Gchat to talk to their buddies. Why not – the Gchat window is right there, next to their emails and very easy to use. Problem is, Google automatically analyzes everything...
View ArticleI received the toolbag, thanks, @aaronportnoy @drraid
I received the toolbag, thanks, @aaronportnoy @drraid
View ArticleKey Trends Impacting the Next-Gen Data Center – Part 1
Everyone’s talking about these various next-gen data center trends – and there are so many buzz-words which makes it hard to follow… So I’ve decided to pick-up the glove, and in my next blog series I...
View Article3D Visualization of Attack and Exploit Paths
I recently posted some new video’s to Tenable’s Youtube channel about how to visualize network attack and exploit paths in 3D. The videos are located on this playlist. They make use of data from...
View ArticleApple joins the big leagues
I've been hearing 'OS X is secure' for a decade now. For a decade, I've been challenging that assertion. The challenges to that assertion generally end up with a response of 'because it's Unix' or...
View Articleviolate corporate policies, go to jail?
Here's where playing Farmville at work will get you... This week, the Ninth Circuit US Court of Appeals ruled on a case which has an important impact on us information security types: US vs. Nosal....
View Articleis your company’s social media policy legal?
As the line between work and personal life becomes thinner and thinner, employee use of social media sites has become a more and more important (and vexing) issue for organizations. Companies are...
View ArticleNew AMTSO Resources
New links have been added to the AMTSO resources page and the AMTSO documents page.
View ArticleSBN Sponsor Post
See what you missed at RSA Conference 2012 in San Francisco. View keynotes and session presentations.http://bit.ly/H2OSbR
View ArticleFTC to Google – "We asked you FIVE times, but now we are SERIOUS"
It looked as though Google had got away with its Street View WiFi data collection fiasco in the USA. Until last Friday, when the FTC issued a resounding-sounding Notice of Apparent Liability for...
View ArticleSBN Sponsor Post
April Webcast: register now for our upcoming webcast, “Large Scale Cloud Forensics” at 2pm EST April 25th.http://bit.ly/xOGmy0
View ArticleNew Report Finds Core Vulnerabilities Persist In Web Applications
Cenzic details prevalence of critical application layer vulnerabilities, such as Cross Site Scripting (XSS) and SQL Injection
View ArticleDataMotion Announces Next-Generation Platform For Cloud-Based Secure Data...
DataMotion Platform available as a public, private, or hybrid cloud solution
View ArticleSBN Sponsor Post
Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l
View ArticleThe Case Against Unindicted IT Co-Conspirators
One of the things that is generally assumed about IT security is that the bad guys are making use of some massive amount of IT infrastructure they invested in to send malware. In reality, a report from...
View ArticleSourcefire FirePOWER – Bigger, Stronger, Faster
Today marks an achievement not yet seen in our industry. NSS Labs has released three product analysis reports on IPS that contain testing data on the of the 8120, 8250, and 8260. For the fourth year...
View ArticleSome more general Apple security links
[Update: a couple of interesting articles from the estimable Roger Grimes: Did the Mac malware wake-up call fall on deaf ears? and the earlier Malware wake-up call for Mac users.] Anyone still clinging...
View ArticleAre you an infosec blogger near London on April 24th? Meet other bloggers at...
Are you an infosec blogger near London on April 24th? Meet other bloggers at the blogger meetup, infosecbloggersmeetup.eventbrite.co.uk Please share!
View Article