SBN Sponsor Post
Share your best advice with us – tell us the best advice you’ve ever received, heard or given.http://bit.ly/xbdT9q
View ArticleWill 2012 see the end of the Cold War over Intellectual Property Rights?
From the European demonstrations against ACTA and copyright to arguments on Open Software and patent the quiet Cold War over digital intellectual property rights (whether software or content) is...
View ArticleCongress: Cyber Security & the Private Sector, and FBI Hacked
Congress recently held hearings on cyber security and how to protect our public and private interests. It was agreed that current law is outdated and needs to change. We must come up with unique...
View ArticleChanging VCVA SSL Certificates
Michael Webster at Long White Virtual Clouds has a great post on changing the SSL certificates for the vCenter Server Virtual Appliance (VCVA): …because the vCenter Server Virtual Appliance is Suse...
View ArticleGuide to BYOD at RSA 2012
Are you looking for the best BYOD content at the 2012 RSA Conference? If so, here's a list of events and sessions to add to your agenda. MORE > Click the title to read the full article.
View ArticleYour BYOX Resource Guide
BYOX is my new buzzronym. Handling BYOD and the consumerization of technology is one of the hottest topics this year. Here are your resources for BYOD at RSA Conference and beyond. MORE > Click the...
View ArticleSBN Sponsor Post
RSA Conference US 2012 keynote lineup announced. Tony Blair to give closing keynote address.http://bit.ly/wrm3Aw
View Articlehttp…">Debunking the "no melt of Himalayan glaciers" canard – great analysis by...
Debunking the "no melt of Himalayan glaciers" canard- great analysis by Peter Hadfield... > http://t.co/J6Fe37YI <
View ArticleSBN Sponsor Post
Get a sneak peak into RSA Conference 2012 with podcasts from industry experts and speakers.http://bit.ly/fmaLXU
View ArticleAre Wireless Access Points part of your network?
Were your access points part of your original equipment when the rest of your network was planned/built? Probably Not. New installs, or green field installations, are networks with an existing physical...
View ArticleWombat Continues To Make Learning About Security Fun
I last wrote about Wombat a few months back.They are a company that was spun out of Carnegie-Mellon University and based on some work done under a US Government grant. Based on game theory, they had...
View Article2012: Year of the Skimmer
An article from Bank Info Security called 2012 the “Year of the Skimmer,” due to an increasing trend in ATM fraud and card-skimming. It noted six top trends for financial institutions and...
View ArticleThe malware problem looks better after the first cup of coffee
Since most of my income comes from a company on the West Coast, I’m used to people assuming that I should be working according to their time zone rather than my own (GMT). But apparently we’re all...
View ArticleExperian Data Breach Resolution Launches Innovative Mobile Application for...
App to help legal, compliance and security professionals respond to a data breach
View ArticleApple Supplier Foxconn Singled Out by Hacker Group for Poor Working Conditions
Foxconn, a major manufacturer for Apple iPads and iPhone was hacked and attacked over the weekend by a group calling itself Swagg Security.
View ArticleKaspersky maintains profitability and control as they move into 2012
Last week, The Tech Herald traveled to Mexico in order to attend an event hosted by Kaspersky. Yes, I know that's bragging. But considering Indianapolis was just ending a week of Super Bowl madness,...
View ArticleAn unexpected threat model
I learned something interesting while I was watching the video "Lessons Learned from Four Years of Implementation Attacks against Real-World Targets", one of the talks at the recent crypto theory and...
View ArticleWhere You Want to Be This Week for 2012-02-13
Where do you want to be this week? Now you’ll always know with our “Where You Want to Be This Week” feature, which will tell you about infosec meetups happening in your local area as of Sunday night....
View ArticleImplementing DLP- Deploying Network DLP
Deploying on the network is usually very straightforward; especially since much of the networking support is typically already built into the DLP server. If you encounter complications they will...
View Article