Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Updated Map And Inventory of Europe’s "Digital Fire Brigades" With 173...

An updated version of the Inventory of CERT activities in Europe is also available

View Article


Image may be NSFW.
Clik here to view.

Security Awareness Sticker Program: Creative Behavior Change

The SANS Securing The Human Program has launched a Security Awareness Sticker Challenge. Participation is simple: create a sticker that conveys a key security awareness message and submit it to...

View Article


Image may be NSFW.
Clik here to view.

Juniper Networks Releases New Mykonos Security Software To Stop Web Attacks

Mykonos software uses attacker's behavior against them

View Article

Image may be NSFW.
Clik here to view.

Web Security is Still a Problem…but It’s Not What You Think

Since I first got involved with information security I’ve been a strong proponent of focusing on the common sense basics. We all know what needs to be done yet I see fundamental web security problems...

View Article

Image may be NSFW.
Clik here to view.

The Internet alphabet

Suppose that you’re using Google to find something. Maybe you’re looking for a company that can provide data protection solutions based on identity-based encryption and format-preserving encryption, so...

View Article


Image may be NSFW.
Clik here to view.

How to teach tomorrow’s doctors about social media privacy

Social media and health care privacy may not mix well, but telling the trainees who have grown up with social media to simply "abstain – or else!" doesn't help students structure their behaviours in...

View Article

Image may be NSFW.
Clik here to view.

What is Anonymous 3: LulzSec vs Anonymous

Read previous: What is Anonymous 2: Are the Anonymous hacktivists really anonymous? The final part of the “What is Anonymous” talk is dedicated to the story of how Anons ended up moving into a strictly...

View Article

Image may be NSFW.
Clik here to view.

How To Increase Logging Performance & Save $100,000

As many CISOs out there know too well, web-accessed applications must provide logging to enable anti fraud and business context visibility on application activity. In many cases, those applications...

View Article


Image may be NSFW.
Clik here to view.

Software Security is a Business Problem – Notes from a developer conference...

Every once in a while I'm lucky enough to be asked to come speak as an outsider at a customer event.  Yesterday I was honored to speak at a large customer's developer-centric conference, where I spoke...

View Article


Image may be NSFW.
Clik here to view.

Software Security is a Business Problem – Notes from a developer conference...

Every once in a while I'm lucky enough to be asked to come speak as an outsider at a customer event.  Yesterday I was honored to speak at a large customer's developer-centric conference, where I spoke...

View Article

Image may be NSFW.
Clik here to view.

Before The Decision Point: Reminders Of Morality

I recently came across a great Wall Street Journal article titled, “Why We Lie,” by Dan Ariely of Duke University.  He has a forthcoming book that I am now eager to read: “The (Honest) Truth About...

View Article

Image may be NSFW.
Clik here to view.

Data as a Gravity Well

Las Vegas hosted one of EMC’s premier events, EMC World. While this show is primarily IT focused, RSA (the Security Division of EMC) makes a presence every year. This year was my second to attend, and...

View Article

Image may be NSFW.
Clik here to view.

The Ultimate Defense Against Advanced Persistent Threats

Sorry about that, I knew the title would pull you in…but what I have to say will, in the end, support the headline. The reason for the showmanship is that if the title had been “End User Training and...

View Article


Image may be NSFW.
Clik here to view.

Microprocessors Found To Possess Backdoors…

Unsurprising news, via Sergei Skorobogatov Ph.D., currently in the post-doctorate program within the Security Group at the Computer Laboratory of the University of Cambridge, has apparently discovered...

View Article

Image may be NSFW.
Clik here to view.

Advanced Persistent Threat (APT), What’s Malware Got To Do With It?

Ugh, here we go again.  As awareness continues to rise about the likelihood of a targeted attack succeeding in an enterprise (a good thing – the awareness, not the likelihood of an attack), security...

View Article


Image may be NSFW.
Clik here to view.

Nitrozac and Snaggy: Internet Entrepreneur

via the comic genius of Nitrozac and Snaggy at The Joy of Tech™

View Article

Image may be NSFW.
Clik here to view.

Ensure a Secure Transition to IPv6

IPv6 is coming soon, whether information security professionals like it or not. So it’s best to be prepared rather than ignore or resist the process. On June 6, dubbed World IPv6 Launch Day by the...

View Article


Image may be NSFW.
Clik here to view.

[Honeypot Alert] Inside the Attacker’s Toolbox: Botnet Credit Card Validation...

In  our previous blog post "Inside the Attacker's Toolbox: Botnet Web Attack Scripts" we analyzed some botnet scripts that SpiderLabs Research team had captured that are used to conduct massive attack...

View Article

Image may be NSFW.
Clik here to view.

After Breach, Ethical Hackers Invited To Probe Gaming Database

The owner of GameReplays.org has invited ethical hackers to probe the website for vulnerabilities after a recent compromise that resulted in 10,000 member accounts being exposed. GameReplays.org is...

View Article

Image may be NSFW.
Clik here to view.

Cryptography for Mere Mortals #5

An occasional feature, Cryptography for Mere Mortals attempts to provide clear, accessible answers to questions about cryptography for those who are not cryptographers or mathematicians. Q: How do we...

View Article
Browsing all 37364 articles
Browse latest View live