… more suitable for my needs, but I’m not sure about it. So, lots of options,...
Have a look at Zafesoft, as well as ArtistScope. Let me know if these fall short of what you are looking for.
View ArticleREVIEW: “Steve Jobs”, Walter Isaacson
BKSTVJBS.RVW 20111224 “Steve Jobs”, Walter Isaacson, 2011, 978-1-4104-4522-3 %A Walter Isaacson pat.zindulka@aspeninstitute.org %C 27500 Drake Road, Farmington Hills, MI 48331-3535 %D 2011 %G...
View ArticleMicrosoft Active Protections Program and Battling Botnets – TwC Interactive...
Continuing the Interactive Timeline series outlining some of the seminal events that have occurred over the last ten years, this post looks at more of the key events that shaped Microsoft’s Security...
View ArticleComputational Machinations, Mictyris Guinotae
News, of Nippon based computer science boffins (specifically Yukio-Pegio Gunji, Yuta Nishiyama and Andrew Adamatzky) whom, have reportedly modeled a computational ball-gate device after one of the...
View ArticleInformation Security Experts, Fake
Another superb information security short motion picture from Javvad Malik's accomplice, the inimitable CynicGirl. ⌱
View ArticleInfoSec Daily Podcast Episode 648
Episode 648 - Overblown, Mini Pwner, 15yo Hacker, Cabin Cr3w, and "Weird" Redir
View ArticleCloud Security Infographic Asks,How Good is Your Cloud Security?
New cloud security infographic asks, How Good is Your Cloud Security? The data comes from the Ponemon Research report on Managing Firewall Risks in the Cloud, which is available at...
View ArticleSBN Sponsor Post
See what you missed at RSA Conference 2012 in San Francisco. View keynotes and session presentations.http://bit.ly/H2OSbR
View ArticleOracle’s Q2 CPU Release
Oracle released its latest vulnerability list. What this release highlights is the fact that Oracle should provide work-around instructions rather than dogmatically stick to immediate patching as the...
View ArticleLightweight Portable Security
The Lightweight Portable Security (LPS) distribution has been around for awhile but I thought I’d put out a quick post for those that might not be familiar with it. The DoD created this Linux distro...
View ArticleThe Defensible Enterprise
Visible Risk: The Defensible Enterprise. The lead-in to a multipart series outlining Enterprise Visibility, Perspective and creating a defensible enterprise that lends itself towards incident detection.
View ArticleYesterdays blog entry was fiction – I hope
For the avoidance of doubt, I have added a footnote to my blog entry on DCMS Broadband strategy yesterday to point out that it was intended as satire. It is not (to the best of my knowledge) based on...
View ArticleHow to generate virtual traffic jams on Yandex Maps
ThebeginningOnce, I (@_chipik) wasstuck in a traffic jam and that got me thinking about how people choose one orthe other route. Obviously, there are many reasons.But animportant role, no doubt, is...
View Articlessh-agent: Abusing the trust – Part 1
This post is about ssh-agent. For those who don't know, the following best describes it (from the man page):ssh-agent is a program to hold private keys used for public key authenticationMany...
View Articlessh-agent: Abusing the trust – Part 1
This post is about ssh-agent. For those who don’t know the following best describes it (from the man page): ssh-agent is a program to hold private keys used for public key authentication Many...
View ArticleSBN Sponsor Post
April Webcast: register now for our upcoming webcast, “Large Scale Cloud Forensics” at 2pm EST April 25th.http://bit.ly/xOGmy0
View ArticleHey! +Paul McNamara! Why am I not on your list? (On second thoughts, no; I...
Hey! +Paul McNamara! Why am I not on your list? (On second thoughts, no; I need to get more creative with my Bragging Rights.)
View ArticleSecurity Forum 2012
The Security Forum is the annual IT-Security Conference in Hagenberg that addresses current issues in this domain. Traditionally it takes place over the course of two days in April. On the first day...
View ArticleFraudulent calls target US banks, another look at caller ID spoofing
A recent report has shown a large increase in the number of fraudulent phone calls attempting to voice phish customers of US banks.
View ArticleEugene Kaspersky on the evolution of malware
Co-founder of Kaspersky Lab and a true cybersecurity guru Eugene Kaspersky gives a short talk, expressing his viewpoint on malware evolution: the way malware was, the way it is now and how things might...
View Article