SBN Sponsor Post
View the RSA Conference August webcast: There.s an App for That: What the Mobile App Explosion Means for Security.http://bit.ly/pZVz0l
View ArticleWar Against Data Breaches: Where Does The CFO Fit In?
The disturbing rash of data breaches in recent years has demonstrated that data security — always a huge concern of CFOs — affects every company and its customers. Entertainment sites, clothing...
View ArticleOpen Tabs 12/26/11
Christmas is over! I hope yours was good, but I personally find the whole build up and let down stressful and I’m glad when it’s done with. Especially the part where my kids are home from school for...
View ArticleSubway Restaurant POS Security Failure Totals $30 Million In Costs
In astoundingly bad point-of-sale security (POS) news of Subway Restaurants’ blatant stupidity (reportedly, the incompetence was centered around the parent company’s franchisee pool, however, in...
View ArticleRacing Away From RSA?
Today’s post was contributed by Sarah Clarke on her thoughts of NIST’s recent update to SP 800-64 Electronic Authentication Guideline. Another milestone has been reached in the race to get rid of...
View ArticleSBN Sponsor Post
Be among the first to register for RSA Conference China 2011. Registration is now open:http://bit.ly/oKqMff
View ArticleThe 5 best Android apps and the 5 worst.
The 5 best Android apps and the 5 worst.http://h30565.www3.hp.com/t5/Mobility-Matters/The-5-best-Android-apps-and-the-5-worst/ba-p/1148 #HPIO The 5 best Android apps and the 5 worst - Input...
View ArticleThings to do in 2012 (1/5)
Promote the adoption of strong authentication mechanisms, e.g. Company smart cards, Brand cards, or a Citizen card, instead of annoying people with passwords.
View ArticleCompensating, or compounding?
Back in the Dark Ages I managed parts departments for a few car dealerships. This was back in the land before time, when dinosaurs, Renaults, and even worse-Peugeots, roamed the US. (Not this long...
View ArticleFacebookery: Fountain of All Knowledge
Infographics galore, serve to illuminate us as to the data stored - relevant to your life, and times - by the new borg, in this case, Facebook, the soon to be usurper of all things interweb. In this...
View ArticleThe When and How of Static Code Analysis
Excellent blog post by John Carmack on assessments relative to risk management and how to find benefit from static code analysis It is important to say right up front that quality isn’t everything, and...
View ArticleWindows 8 Picture Password Fail
The titular Duo Patrem Factor Auctoritas blasts Microsoft Corporations’ (NasdaqGS: MSFT) Windows 8 Picture Password, and relegates it to the “Fisher-Price Toy” league of authentication [for the...
View Articlebeware the thumb (drive) of doom
So, you just found a USB thumb drive that someone left behind on a bus/train/taxi/spaceship… read this article BEFORE you plug it in to your computer… and, come to think of it, before you use a thumb...
View ArticleSBN Sponsor Post
Register for RSA Conference US by January 27, 2012 and save $400.http://bit.ly/mRTeE4
View ArticleOn Working Smarter, and Harder
The subtitle reads These books that lead you to believe that you can achieve success by simply working smarter and not harder are lying. Finally! Someone has written a great, succinct post that...
View ArticleWhere You Want to Be This Week for 2011-12-26
Where do you want to be this week? Now you’ll always know with our “Where You Want to Be This Week” feature, which will tell you about infosec meetups happening in your local area as of Sunday night....
View ArticleCheck the uids and gids
While working on body-outliers, the Python script I wrote to do statistical analysis on fls bodyfiles in an effort to find malicious files in compromised file systems, one of the things I was ignoring...
View Article