Tenable Network Security Podcast Episode 108
Welcome to the Tenable Network Security Podcast Episode 108 Hosts Paul Asadoorian, Product Evangelist Jack Daniel, Product Manager Carlos Perez, Lead Vulnerability Researcher Ron Gula, CEO/CTO...
View ArticleNew Associate of (ISC) Programs For CSSLP And CAP Help Aspiring Professionals...
Program expansion part of push to fill the pipeline of qualified cybersecurity professionals
View ArticleProlexic Revenues Increase 45 Percent In 2011
Significant investments in staffing, R&D and network capacity to accommodate growth
View ArticleSentryBay And NetSTAR Sign Strategic Technology Partnership
Software will support malware and parental control within mobile solution
View ArticleOne critical and six important Microsoft patches to start 2012
The start of the Olympic year of 2012 sees a quick release of 7 patches from Microsoft, including 1 that addresses a critical vulnerability that allows remote code execution when exploited. Websense®...
View ArticleApplication Control Policies: More or Less Work?
So I was recently talking to a prospect about all the advantages of Sourcefire’s new application control feature, highlighting the improved security through visibility, enforceable compliance with...
View ArticleWarning: Traditional Security Breaches are Still at Large
A quick reminder as we settle in to 2012: Security doesn’t just take place at the firewall or via a messaging security appliance. While these security devices are crucial, traditional security breaches...
View Article[Honeypot Alert] Extensive ‘setup.php" Scanning Detected
The SpiderLabs Research Team has identified an extensive scanning campaign which aims to enumerate the "setup.php" pages from a vast number of blogging and CMS applications. Below are the probes that...
View ArticleSOPA Vote January 24, 2012
The clock is winding down in the United States as the they ready to vote on SOPA. Are you a US citizen? Then it is incumbent upon you to contact your representative in Congress to vote no on January...
View ArticleUpdate Your PCs: OK, but How About Printers?
This week was Microsoft Patch Tuesday and you are probably all working now on getting the appropriate updates out to your PCs. But how well are you covering other software vendors, say Adobe, who also...
View ArticleFailing Gracefully? Or Just Failing?
Writing a book has put a serious crimp in my time for many other things, blogging included. I was warned, I know. I’ll quit bitching now. I did a presentation with Alex Hutton and Rich Mogull yesterday...
View ArticleWhat too much information causes
Attention is essentially a cognitive faculty with a very well-marked ethical component, because to be ethical to you, I need to be attentive to your needs and desires. I need to be aware. We cannot be...
View ArticleAnti-Fraud Credit Card Announced
via ArsTechinca’s Ben Kuchera, news of a multi-account capable, programmable credit card, currently in test mode at Citibank, Inc.. [NYSE: C]. Manufactued by Dynamics Inc. the card’s focus is...
View ArticleAir France buys Boeings? To which bizarre parallel universe did I just jump?
Air France buys Boeings? To which bizarre parallel universe did I just jump?Air France-KLM confirms order for 25 787-9s plus 25 optionsAir France-KLM today confirmed that it has placed a firm order for...
View ArticleShow me your SSID’s, I’ll Tell Who You Are!
The idea of this article came from a colleague of mine. He wrote a first version of the script described below. I found it very useful and asked his permission to re-use it and to write this blog...
View ArticleTwC 10 Years: Looking Back and Moving Forward
Posted by: Adrienne Hall, General Manager, Trustworthy Computing You know how every once in a while you get thrown a curveball? Well, almost nine years ago a real big one came my way. In January 2003 I...
View ArticleAutomating Cybersecurity: Scoping The Problem
This is the second post in the Automating Cyber security series – the first being back in October (I really need to speed this up!). In this post, I would like to simply share a train of thought with...
View ArticleICANN now accepting new gTLD applications; are cybersquatters still a real risk?
With ICANN opening their high cost registration process for new gTLDs, what are the legitimate concerns and risks trademark owners may face from cybersquatters?
View ArticleTrustworthy Computing, a Commitment of Significance
I was not at Microsoft ten years ago this week, but the ten year milestone for Trustworthy Computing (TwC) has a lot of significance for me, given that I have spent most of that time working with...
View Article