Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Incite 2/15/2012: Brushfire

I had this fraternity brother back in college named Lucas. We gave him a pretty hard time, mostly because he was the nicest guy you’d ever want to meet. Turns out he didn’t know what jobs just sucked....

View Article


Image may be NSFW.
Clik here to view.

Merchant of Fraud Returns – Shylock Polymorphic Financial Malware Infections...

Last September we blogged about a new polymorphic financial malware variant we had discovered. We codenamed it Shylock because every new build bundles random excerpts from Shakespeare's The Merchant of...

View Article


Image may be NSFW.
Clik here to view.

VIPREcast – Cleaning Up After Botnets

As part of our regular VIPREcast webinar series, this month I’ll be talking about Botnets, giving some examples of Botnet activity and what to look out for when dealing with an infected machine. The...

View Article

Image may be NSFW.
Clik here to view.

Biometric Authentication Business Launches

Natural security announces its international launch plans for 2012

View Article

Image may be NSFW.
Clik here to view.

Porticor Unveils Encryption And Key Management Solution Protecting Cloud Data

Porticor Virtual Private Data system ensures the privacy of data stored in the cloud

View Article


Image may be NSFW.
Clik here to view.

Trend Micro Develops Advanced Cloud-Based Mobile Application Scanning Technology

Trend Micro Mobile App Reputation can automatically identify, analyze, and rate mobile applications for issues

View Article

Image may be NSFW.
Clik here to view.

iPhone 5 tester SMS text scam hits cellphone users

Want to test an iPhone 5? Sorry - but it's an SMS text spam campaign sent to mobile phone users.

View Article

Image may be NSFW.
Clik here to view.

The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to...

Just got a copy of The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) by Dawn Cappelli, Andrew Moore and Randall...

View Article


Image may be NSFW.
Clik here to view.

Abandon FUD, scare tatics and marketing hype to sell information security

For years, going back over a decade, as I worked in and managed IT and security teams in SMBs to a Fortune 10, sales people have been selling FUD. In case you're not familiar with the term, FUD refers...

View Article


Image may be NSFW.
Clik here to view.

SBN Sponsor Post

Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l

View Article

Image may be NSFW.
Clik here to view.

Database Security TLAs Make Me LOL

Did you ever notice how some markets go through never ending cycles of naming, re-naming and re-re-naming themselves? It feels like déjà vu all over again in the Database Security space as we see a...

View Article

Image may be NSFW.
Clik here to view.

Why are we talking philosophy instead of technology?

A friend of mine recently complained in Twitter that, according to his count, nearly 80% of all talks given at the security conferences he’d looked at recently were now non-technical.  It might be in...

View Article

Image may be NSFW.
Clik here to view.

‘No-Harm’ Data Breach Costing Texas at Least $600K

There is what we like to call collateral damage when a data breach occurs even when there is no damage to those whose records were exposed.

View Article


Image may be NSFW.
Clik here to view.

Java Security Update Scrubs 14 Flaws

Oracle has shipped a critical update that fixes at least 14 security vulnerabilities in its Java JRE software. The company is urging users to deploy the fixes as quickly as possible. Java flaws are a...

View Article

Image may be NSFW.
Clik here to view.

ADT Business Solutions provides insight on plant security solutions and...

With the recent implementation of the Food Safety Modernization Act (FSMA) and the Bioterrorism Preparedness and Response Act of 2002, effective plant security measures are a high priority, now more...

View Article


Image may be NSFW.
Clik here to view.

The biggest cost of PKI

PKI is notoriously expensive. The US government alone has spent over $1 billion on the technology and doesn't really seem to have much to show for their investment. But there are actually even bigger...

View Article

Image may be NSFW.
Clik here to view.

Are IPS and NGIPS the same? Introducing Next-Generation Network Security...

Today's post introduces a video series called "Next-Generation Network Security: Fact or Fiction?" that will be shared over the course of the coming months. In the series, we will showcase brief videos...

View Article


Image may be NSFW.
Clik here to view.

Who has better privacy laws: USA or European Union?

The need for a digital consumer bill of rights for data protection really depends on where you live. If you're in Europe, you are already pretty well protected, but it's a very different if you live in...

View Article

Image may be NSFW.
Clik here to view.

Firewall Policy Management for Next-Generation Infrastructures

Yesterday, we announced the latest release of AlgoSec Security Management Suite, which addresses the growing complexity of security policies, especially in networks where next-generation firewalls and...

View Article

Image may be NSFW.
Clik here to view.

BPD Satirical Hack Response

  Well crafted hack response by the Boston Police Department (BPD) to the recent defacement of the Department’s site by miscreants unknown.. Outstanding, and our kudos to the BPD. ⚔ , ♘ , ↂ

View Article
Browsing all 37364 articles
Browse latest View live