Quantcast
Channel: Security Boulevard
Browsing all 37364 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Security Personae, the Unicorn

So far, you have learned about trolls, rockstars, and squirrels. But what about the biblical version of the grasshopper? The Unicorns didn’t miss the Ark because they were playing, they were busy...

View Article


Image may be NSFW.
Clik here to view.

Theodore

View Article


Image may be NSFW.
Clik here to view.

Symplified Integrates With Symantec VIP To Extend Strong Authentication To...

Symplified provides a self-service portal for Symantec VIP provisioning

View Article

Image may be NSFW.
Clik here to view.

Security Personae, the Ninja

After adding unicorns to our list of personae that includes trolls, rockstars, and squirrels, it’s time to discuss one final personae—the Ninja. While the unicorn has a solid foothold in infosec lore,...

View Article

Image may be NSFW.
Clik here to view.

Security Personae, the Ninja

After adding unicorns to our list of personae that includes trolls, rockstars, and squirrels, it’s time to discuss one final personae—the Ninja. While the unicorn has a solid foothold in infosec lore,...

View Article


Image may be NSFW.
Clik here to view.

RSA Conference Photos

Photos from the RSA Conference 2012. We asked attendees who "the best security people are..." If you are at the conference, drop by our booth compete in our game and to have your photo taken.

View Article

Image may be NSFW.
Clik here to view.

Discover Your Security Persona at RSA Conference!

What an afternoon! We’ve learned about ninjas, trolls, unicorns, squirrels, and rockstars. One of these personas might just fit your perfectly! If you want to have a super-official assessment of your...

View Article

Image may be NSFW.
Clik here to view.

Discover Your Security Persona at RSA Conference!

What an afternoon! We’ve learned about ninjas, trolls, unicorns, squirrels, and rockstars. One of these personas might just fit your perfectly! If you want to have a super-official assessment of your...

View Article


Image may be NSFW.
Clik here to view.

InfoSec Daily Podcast Episode 605

Episode 605 - Microsoft Fail, Facebook Millionaires, Mac Hole, Webkit Vuln, and Facebook Snoopers

View Article


Image may be NSFW.
Clik here to view.

Passwords that should never be used

Online passwords are your best friend. Listed are sample passwords you should never use; which includes the name of your best friend too. If your current password is among this list, please change it...

View Article

Image may be NSFW.
Clik here to view.

SecuraBit Episode 99: 99 Bottles of Pwn on the Wall!

Join us as we interview the CTO of Silicum Security about ECAT, Pascal Longpre! Please refer to our wiki for full show notes.

View Article

Image may be NSFW.
Clik here to view.

SBN Sponsor Post

RSA Conference US 2012 keynote lineup announced. Tony Blair to give closing keynote address.http://bit.ly/wrm3Aw

View Article

Image may be NSFW.
Clik here to view.

Ramirez: Apology

via the Political Commentary Genius of Micahel Ramirez at Cagle.com

View Article


Image may be NSFW.
Clik here to view.

PSI 3.0: Auto-Patching for Dummies

A new version of the Personal Software Inspector (PSI) tool from vulnerability management firm Secunia automates the updating of third-party programs that don’t already have auto-updaters built-in....

View Article

Image may be NSFW.
Clik here to view.

iOS 5 Trusted Root Certificates

Apple Support has a KB article with a list of trusted root certificates These trusted root certificates are preinstalled with iOS 5. When IT administrators create Configuration Profiles for iPhone,...

View Article


Image may be NSFW.
Clik here to view.

Is There A Difference Between In The Cloud Versus On Premises Attacks?

At my panel at the America’s Growth Capital Partners Conference today a threshold question was is their a difference between cloud security and on premises security. The answer was almost a unanimous...

View Article

Image may be NSFW.
Clik here to view.

Do This, Do That for SSL/TLS

Transport layer security (TLS), also referred to by its predecessor's name secure sockets layer (SSL), cannot be implemented easily "out the box" in a robust manner. A new guide was published last...

View Article


Image may be NSFW.
Clik here to view.

Changing of the Guard – a perspective on the changing CISO role

Well, I survived my first day of RSA Conference 2012, and the gauntlet of meetings, lunches, meet-ups and interviews that is this crazy stretch of trade-show ever year. I'm particularly happy as I...

View Article

Image may be NSFW.
Clik here to view.

The BYOD security challenge: How scary is the iPad, tablet, smartphone surge?

Employee use of personally-owned computing devices for work-related purposes–known as Bring Your Own Device or BYOD–is not a new trend and security professionals have been concerned about it for some...

View Article

Image may be NSFW.
Clik here to view.

Orchestrating a New Solution for User Authentication

I’ve never spent much time in an office. I wouldn’t say that I’m Up in the Air as much as George Clooney’s Ryan Bingham. But the value of personal interaction with our customers from Sao Paolo to...

View Article
Browsing all 37364 articles
Browse latest View live