Cloud Fundamentals Video Series: Evaluating Different Cloud Service Offerings...
you’ve been following our Cloud Fundamentals series, you’ve heard me discuss why transparency is important for both cloud service providers and their customers. Another important aspect of this theme...
View ArticleNew Privacy, Security, Anti-Tracking Software For Internet Explorer
Cocoon prevents computer from directly touching the Internet
View ArticleSBN Sponsor Post
Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l
View ArticleNSA Is Waiting For A Major Incident To Create New Cyber Law
So, it appears that the NSA is waiting for a major incident to create new cyber law. They have made it clear that they would enjoy nothing better than to have open access to private networks. This...
View ArticleCrimevertising: Selling Into the Malware Channel
Anyone who’s run a Web site is probably familiar with the term “malvertising,” which occurs when crooks hide exploits and malware inside of legitimate-looking ads that are submitted to major online...
View ArticleArrow Revolution Deadbolt
Recently, I had to opportunity to install one of Arrow's Revolution Deadbolts. This is a battery powered, electronic deadbolt with an attractive, touch screen keypad. First, an admission. I'm not a...
View ArticleWASC Distributed Web Honeypots Project Update
As the WASC Distributed Web Honeypots Project Sponsor, we are excited to announce that we have officially launched the next phase of the project! If you would like to participate, please read below....
View ArticleReport: Hacked Syrian officials used ’12345′ as email password
After hundreds of emails from the office of Syrian President Bashar al-Assad were leaked on Monday, a report revealed that several of Assad's aides and advisers used the password "12345."
View ArticleA Single-Site Browser’s impact on XSS, CSRF, and Clickjacking
A Single-Site Browser (SSB) is a highly restricted Web browser only capable of connecting to a single website. A “website” can be defined as a white-listed collection of one or more hostnames, IP...
View ArticleSyrian President Bashar Assad’s Staff Email Hacked
In a moment where I cannot help but to laugh the beleaguered president of Syria had his staffers email hacked according to an article that was posted on the Israeli news site Haaretz. The hacktivist...
View ArticleRSA Conference 2012: Industry Experts Track
This week I would like to highlight our Industry Experts track. This track is our largest room and has some of our long-term highest rated speakers, famous authors and CSOs from the latest IPOs. Here...
View ArticleTHE TRUTH BEHIND DATA BREACHES…
I was pleased to see the Trustwave2012 Global Security Report, released a coupleof days ago as I find it always a very good source of information! This year’s report analyses 300 data breach...
View ArticleFBI Cloud Compliance Challenges
Computerworld has a nice summary of why FBI data compliance requirements are often incompatible with cloud providers: One of the more challenging requirements requires cloud service providers to...
View ArticleVMware and PCI QSAs
Dave Jasso has posted an update on VMware's efforts to help its customers with virtualization and PCI DSS 2.0 VMware has been working with QSAs such as Coalfire to clarify how to successfully address...
View ArticleDistant Diamonds, Quantumly Entangled
OptionsThe vibrationally separated states of two spatially separated diamonds entangled at room temperature by scattering a pair of strong pump pulses (green). (Science/AAAS) via the EpochTimes, comes...
View ArticleEndpoint Security Webinar: Protecting your network at the sharp end
I have a theory that says improving information system security–the security of our operating systems, network connections, and applications–just means the bad guys will focus more attention on our...
View ArticleThe Brads: Designers Guide To Avoiding Terminal
via the genius of The Brads at bradcolbow.com
View ArticleInfoSec Daily Podcast Episode 589
Episode 589 - Not So Anonymous, Indiana Malware, Non-Secure Wireless & TSA Manage your Security?
View ArticleBe Famous- Share Words of Wisdom with RSA
Everyone has heard or given advice that has impacted his or her life... will you share yours? MORE > Click the title to read the full article.
View Article