Incite 2/15/2012: Brushfire
I had this fraternity brother back in college named Lucas. We gave him a pretty hard time, mostly because he was the nicest guy you’d ever want to meet. Turns out he didn’t know what jobs just sucked....
View ArticleMerchant of Fraud Returns – Shylock Polymorphic Financial Malware Infections...
Last September we blogged about a new polymorphic financial malware variant we had discovered. We codenamed it Shylock because every new build bundles random excerpts from Shakespeare's The Merchant of...
View ArticleVIPREcast – Cleaning Up After Botnets
As part of our regular VIPREcast webinar series, this month I’ll be talking about Botnets, giving some examples of Botnet activity and what to look out for when dealing with an infected machine. The...
View ArticleBiometric Authentication Business Launches
Natural security announces its international launch plans for 2012
View ArticlePorticor Unveils Encryption And Key Management Solution Protecting Cloud Data
Porticor Virtual Private Data system ensures the privacy of data stored in the cloud
View ArticleTrend Micro Develops Advanced Cloud-Based Mobile Application Scanning Technology
Trend Micro Mobile App Reputation can automatically identify, analyze, and rate mobile applications for issues
View ArticleiPhone 5 tester SMS text scam hits cellphone users
Want to test an iPhone 5? Sorry - but it's an SMS text spam campaign sent to mobile phone users.
View ArticleThe CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to...
Just got a copy of The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) by Dawn Cappelli, Andrew Moore and Randall...
View ArticleAbandon FUD, scare tatics and marketing hype to sell information security
For years, going back over a decade, as I worked in and managed IT and security teams in SMBs to a Fortune 10, sales people have been selling FUD. In case you're not familiar with the term, FUD refers...
View ArticleSBN Sponsor Post
Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l
View ArticleDatabase Security TLAs Make Me LOL
Did you ever notice how some markets go through never ending cycles of naming, re-naming and re-re-naming themselves? It feels like déjà vu all over again in the Database Security space as we see a...
View ArticleWhy are we talking philosophy instead of technology?
A friend of mine recently complained in Twitter that, according to his count, nearly 80% of all talks given at the security conferences he’d looked at recently were now non-technical. It might be in...
View Article‘No-Harm’ Data Breach Costing Texas at Least $600K
There is what we like to call collateral damage when a data breach occurs even when there is no damage to those whose records were exposed.
View ArticleJava Security Update Scrubs 14 Flaws
Oracle has shipped a critical update that fixes at least 14 security vulnerabilities in its Java JRE software. The company is urging users to deploy the fixes as quickly as possible. Java flaws are a...
View ArticleADT Business Solutions provides insight on plant security solutions and...
With the recent implementation of the Food Safety Modernization Act (FSMA) and the Bioterrorism Preparedness and Response Act of 2002, effective plant security measures are a high priority, now more...
View ArticleThe biggest cost of PKI
PKI is notoriously expensive. The US government alone has spent over $1 billion on the technology and doesn't really seem to have much to show for their investment. But there are actually even bigger...
View ArticleAre IPS and NGIPS the same? Introducing Next-Generation Network Security...
Today's post introduces a video series called "Next-Generation Network Security: Fact or Fiction?" that will be shared over the course of the coming months. In the series, we will showcase brief videos...
View ArticleWho has better privacy laws: USA or European Union?
The need for a digital consumer bill of rights for data protection really depends on where you live. If you're in Europe, you are already pretty well protected, but it's a very different if you live in...
View ArticleFirewall Policy Management for Next-Generation Infrastructures
Yesterday, we announced the latest release of AlgoSec Security Management Suite, which addresses the growing complexity of security policies, especially in networks where next-generation firewalls and...
View ArticleBPD Satirical Hack Response
Well crafted hack response by the Boston Police Department (BPD) to the recent defacement of the Department’s site by miscreants unknown.. Outstanding, and our kudos to the BPD. ⚔ , ♘ , ↂ
View Article