Aggregated Data and the Threat of Re-Identification
I have written before about the risks of clauses in technology contracts giving the vendor broad and, usually, undefined rights in aggregated data of their customers. Specifically, I have talked about...
View ArticleDARPA: Assured Arctic Awareness Initiative
News of DARPAs' latest focus, - the aptly monikered Assured Arctic Awareness - has made itself known here at Infosecurity.US headquarters. Whilst not necessarily associated with the Fortress of...
View Article10 Steps for Early Incident Detection
We’ve all said it before: “When it comes to data breaches, it’s not a matter of IF but WHEN.” As we accept that eventually we’re going to have to respond to incidents, it just makes sense to focus our...
View ArticleSpam Promises Riches, Delivers Expensive Balloons
You know what I like? Free money. You know what else I like? Free cars. You know what I like best of all? Balloons. If only there was a piece of email spam relevant to my interests where I could...
View ArticlePCI DSS audits can be a nightmare or an opportunity
Move past the debate over whether PCI DSS compliance really makes an organization more secure and focus on how put it to work for you. It comes down to this: If you are a CISO, how can you turn the QSA...
View ArticleRT @WeldPond: "Forget the banks. It is the internet that is too big to fail."…
RT @WeldPond: "Forget the banks. It is the internet that is too big to fail." -Geer #sourcebos
View ArticleTeamSHATTER’s Analysis Of The April 2012 Oracle CPU
It’s a Wednesday in mid-April, so it’s Oracle CPU fallout time again. This April 2012 CPU contains 88 fixes across various Oracle product lines. Specifically, Database, Fusion Middleware, Enterprise...
View ArticleSBN Sponsor Post
Submit a session proposal to present at RSA Conference Europe 2012 – Call for Speakers opens April 10th.http://bit.ly/fcI5QA
View ArticleThe DCMS "Olympics First" Broadband Strategy: the pieces fall into place
"Delay rural broadband to prevent distraction until BT, the Mobile Operators and their contractors have completed the upgrades and testing necessary to serve the games venues and prevent...
View ArticleCORE, NTO Partner To Provide Web App Security Analysis
Integrated solution of NTOSpider and CORE Insight Enterprise will automatically discover application vulnerabilities
View ArticleSophos Survey Reveals Need For IT Security Education Within Organizations
96% of respondents do not trust their end users to make sound IT security decisions
View ArticlevSphere 5.0 Hardening Guide
VMware has announced the release of a draft of their new hardening guide for vSphere 5.0 This is the public draft of the vSphere 5.0 Security Hardening Guide. It is being posted to this Community in...
View ArticleThe Patchwork Cloud – Portability of Security in Cloud Computing
In a previous post on this topic, I talked about how when you're thinking cloud, you really need to think about a model-driven approach. Today's post is a continuation of that thinking and discusses...
View ArticleTemporary Post Used For Theme Detection (b332605c-5a2d-4efb-886d-407fcf1c5295...
This is a temporary post that was not deleted. Please delete this manually. (ae7a77f6-84fe-4ffc-9c9b-7b532afe2578 - 3bfe001a-32de-4114-a6b4-4005b770f6d7)
View ArticleThe CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to...
While Julius Caesar likely never said “Et tu, Brute?” the saying associated with his final minutes has come to symbolize the ultimate insider betrayal. In The CERT Guide to Insider Threats: How to...
View ArticleBusting someone out of prison? Forget about the hacksaws. Hack the SCADA system
Rocky: “Pass the word, we’re busting out at 2 a.m. Everyone.” Snake: “Everyone? How we gonna’ open all the cells. How about the gates? Hah? Rocky: “We have a brain who is gonna get into the SCADA...
View ArticleHow to recognize a PC support scam
A while ago, I responded to a blog comment promising some thoughts on how to recognize a cold-calling PC support scam. Unfortunately, I wasn't able to do that immediately, and then I was on vacation...
View ArticleHi Peter,I am bringing up a website to sell e-books. I was counting on...
I need to know what your budget is before I can recommend a possible solution or solutions. It seems that price is a main issue, however it could be that Vitrium is the right solution for you. The...
View ArticleCisco and the Networking Industry: Golden Age or Golden Fleece?
A recent and rather ambitious outlook on Cisco at Motley Fool entitled “Cisco and the Golden Age of the Internet “ talks about the rise in internet traffic and the growth potential it holds for...
View Article