CISSP Reloaded–Domain 7: Applications and Systems Development
This is the 7th part on my CISSP Reloaded where I am revisiting the 10 CISSP domains I studied for many years ago to see what has changed and how much of it I have retained as well as adding in my own...
View ArticleImproving our risk model
One of the more fun parts of designing your own software is watching it evolve as you get smarter. Explicit feedback says one thing, observing people says another, software gets used, ignored, or used...
View ArticleGlobal Payments Security Breach Update – 1.5 Million Credit Card Numbers...
The debacle over U.S. Credit Card processing company Global Payments security breach and stolen credit numbers continued yesterday with a press release from the company answering questions. Global...
View ArticleThank you Aaron
Posted by Scott Lambert Thank you Aaron In a recent tweet, some of you may have seen that Aaron Portnoy, the head of our Zero Day Initiative program has decided to move on to other opportunities....
View ArticleOpenX Promises Fix for Rogue Ads Bug
Hackers are actively exploiting a dangerous security vulnerability in OpenX — an online ad-serving solution for Web sites — to run booby-trapped ads that serve malware and browser exploits across...
View ArticleChallenge-Response Authentication? No Problem.
The following post is brought to you by one of HP's most talented presales consultants, Hans Enders, in collaboration with Steve Hardeman, Jeremy Brooks, and several other developers within the...
View ArticleICSA Labs Healthcare Program – MU UPDATE
ICSA Labs' Healthcare Team provides a Meaningful Use Update which includes information related to the approaching deadline for submitting public comment to ONC as well as several federal resources that...
View ArticleFacebook Steps Up Security Efforts
There’s no doubt that social media as emerged as a major conduit through which malware is now be distributed across the Internet. What’s nice to see is that the owners of social networking sites are...
View ArticleCheck Point Ups Free Anti-Malware Game
One of the core issues with security is that the quality of the security software deployed by individuals tends to vary widely. Some people don’t use and security software, while others opt to use free...
View ArticleRant & Poll: Can We Just Let this Google Wifi Slurping Thing Die?
In the past few weeks Google has been back in the news for their whole wifi slurping mess. First it was the FCC slap on the wrist $25K fine. More recently, Google disclosed the name of the programmer...
View ArticleInfoSec Daily Podcast Episode 658
Episode 658 - ESX Patch, Healthcare Struggles, Iran Admits to Attacks, Skype SuperNodes, and Chrome
View ArticleREVIEW: “Dark Market: CyberThieves, CyberCops, and You”, Misha Glenny
BKDRKMKT.RVW 20120201 “Dark Market: CyberThieves, CyberCops, and You”, Misha Glenny, 2011, 978-0-88784-239-9, C$29.95 %A Misha Glenny %C Suite 801, 110 Spadina Ave, Toronto, ON Canada M5V 2K4 %D...
View ArticleSBN Sponsor Post
Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l
View ArticleCryptography – As Strong As Your Weakest Link
Cryptography is as old as communication itself in many respects, with people (and even animals) developing mechanisms to shield messages from those who are not trusted. One of the most common that has...
View ArticleRSA Archer eGRC Platform Expanded
Newest release includes a Regulatory Management solution
View ArticleHow Mobile Apps are Invading Your Privacy Infographic
Every week it seems like there is a new story about a popular mobile application having privacy issues that put its users at risk. With millions of mobile apps receiving billions of downloads, it is...
View ArticlePlixer And Enterasys Networks Enhance BYOD Security And Reporting
Webcast reveals methods to leverage NetFlow reporting and mobile IAM features
View ArticleHotel booking confirmation emails aim to infect your computer. Watch out!
Be on your guard against emails that claim to be about a hotel booking that you never made - you could be putting your computer at risk of infection by malware.
View ArticleSymplified And Qubera Partner On Identity Management For Cloud, SaaS And...
Qubera Solutions will provide Symplified solutions to customers that need to unify IAM for premises-based, cloud, and mobile applications
View ArticleList of Domains Hosting Webshells for Timthumb Attacks
We have been tracking TimThumb related attacks for a while and they are still at full force (yes, some people are still using the outdated versions and getting compromised). Just for the month of May,...
View Article