There is no spoon.
I just read this article from TechTarget, quoting Gartner research vice president Ramon Krikken as saying:[...] it may be time to ask whether it’s faster, cheaper and ultimately just as effective to...
View ArticleA Not to be Missed Event for the KVM Community
June 26th through June 29th the Red Hat community will be converging upon Boston for the Annual Red Hat Summit/ JBoss World. The event, held at the Hynes Convention Center, will be jam-packed with...
View Article13 Security Tips To Combat Mobile Device Threats To Healthcare
Risks to patient data growing, as cited by Department of Homeland Security
View ArticleWurldtech Provides Schneider Electric With Achilles Lab Accreditation
Achilles Communication Certification provides security benchmark for embedded devices used in industrial infrastructure and other mission-critical connected devices
View ArticleVoltage Security Extends End-To-End Email Encryption To iOS And Android Devices
Voltage SecureMail Mobile Edition allows mobile users to read encrypted messages sent from Voltage-enabled desktops, gateways, enterprise applications and other mobile devices
View ArticleRedspin Pioneers Advanced Persistent Threat (APT) Assessment Service
New service uses multiple attack vectors and shared knowledge assessments
View ArticleCheck Point Survey Reveals A Generation Gap In Computer Security
More than three-quarters of Gen Y respondents do not follow security best practices
View ArticleWhat We’re Reading, Week of 6/18
Computerworld- Remote access technologies in a BYOD era FierceTelecom- World IPv6 Launch results: What effect did the event have on the Internet? GigaOM- BYOD wave sparks big security concerns CNBC-...
View ArticleCVSS for Penetration Test Results (Part I)
Trustwave has been adding support for the Common Vulnerability Scoring System (CVSS) in PenTest Manager, our online reporting portal used for all SpiderLabs penetration tests. While this is a great...
View ArticleHack in Paris 2012 Wrap-Up Day #2
“Home sweet home!“, its time to wrap-up the second day of Hack in Paris before taking some sleep hours. The second day started with Winn Schwartau from securityexperts.com. His talk was called...
View ArticleDispelling The Myth: Bar of Security
For the last two years, I’ve observed the information security industry buzzing about the Advanced Persistent Threat (APT), highly sophisticated malware, and 0 day exploits. There are many reasons why...
View ArticleTop 3 NoVA Infosec Blog Posts of the Week
It’s that time of the week again: the time where we take a look at what local security bloggers have been up to. You can take a look at what local security bloggers have been up to but if you can’t...
View ArticleNew job and other busy things
Yes, I’m a bit late and this isn’t much of a security video, but I guess I needed to explain where I’d been and seeing as Girl Cynic took some time out of her busy schedule to be available for some...
View ArticleBeacon Podcast Episode 029
Hurricane Labs Beacon Podcast Episode Number: .029 – Holy Island Oracle Edition Hosts: Bill Mathews (@billford), Matt Yonchak (@mattyonchak), Patrick Sayler (@psayler), Tom Kopchak SECURITY LinkedIn...
View Article‘Create a Cartoon of You” ads serving MyWebSearch toolbar
By Dancho Danchev On their way to attract new users, adware providers and online marketers often come up with new and creative ideas tailored to average Internet users. These often include free...
View ArticleWhy do Microsoft Researchers Say They are from Microsoft?
A few people have mentioned that my title on the prior post is causing confusion for those trying to find the original report. Allow me to try and provide a brief summary instead, as well as a link:...
View ArticleHow to Protect Your Gmail Account from Hackers
Hackers target online Email accounts for a reason, they know if they can 'own' a webmail account, they can access it from anywhere and at any time, to use it as a tool and to harvest information of...
View ArticleUS Senate proposes national data breach notification act
A new bill has been brought before the US Senate that would unify data breach notification laws across the United States. Read on for what's protected and how it would work.
View ArticleCVE-2012-3586: Basho Riak API, Security Alert
On June 14th a comment on Github asked Basho about validation in their API The riak http api for map reduce doesn't check if the content-type is application/json. The javascript http api also lets the...
View ArticleInfoSec Daily Podcast Episode 700
Episode 700 - VUPEN, Unwanted Printouts, Twitter Outage, AutoCAD Worm, Paycardreader
View Article