Year Of Security for Java – Week 9 – X-Frame-Options
What is it and why should I care? X-Frame-Options (moving towards just Frame-Options in a draft spec – dropping the X-) is a new technology that allows an application to specify whether or not...
View Article20 Years in Infosec; Time to Party like its *1999
I am not a big fan of AT&T (here), but this video from AT&T released in 1990 is about the most insightful view into modern day infosec I’ve ever seen (here) and since it was produced pre-brick...
View ArticleIs it time to reinvent the CISO?
A colleague sent me a headline and executive summary from a Forrester "Forrsights" piece called "The new IT security buyer landscape" by Heidi Shey and Stephanie Balaouras. I have not yet had a chance...
View ArticleDDoS got you down? It’s better than even money the competition is the...
Anonymous is not the biggest threat to launch a distributed denial-of-service (DDoS ) attack your organization. Ideologically and politically inspired (aka hacktivist) DDoS attacks have gained wide...
View ArticleStrawberry Quick Meth scare spreads widely via Facebook
Facebook users are sharing messages warning that children are being targeted with strawberry-flavoured crystal meth. But is there any truth in the widespread warning?
View ArticleDo spam and piracy problems have a common solution?
A statistic offered during recent conference session stimulated a (then) spontaneous and somewhat provocative stream of thought. Using a very, very large sampling of spam, the presenter and his...
View ArticleFree iPad 3? It doesn’t exist! Beware of scams
Chances are that we will see Apple announce an iPad 3 very soon. But don't be duped into believing there's an easy way to get one for free.
View ArticleNew Security Services from EMC Consulting Enable Trusted IT
Right Shot, by Umbrella Shot Trust is a big deal at EMC, and EMC Consulting announced five new services today to enable customers to build new levels of trust and control for next-gen IT...
View ArticleReporting on Risk Management Can Be Just as Threatening
As every organization embraces risk management and tries to prioritize time and money to security, Dark Reading is doing the same with its reporting of risk management.
View ArticleEnCase Enterprise Version 7 Addresses Needs Of Evolving Digital...
Solution includes integrated smartphone support, revamped user experience, and template-driven processing
View ArticleDecoding IPv6: Four Misconceptions that Security Execs Need to Know
IPv6. It’s big, unavoidable, exciting, and concerning… The Internet protocol that we’ve come to know and love (IPv4) is about to get a facelift (or, at least a serious shot of HGH). The tech...
View ArticleExecutive Briefing with Retired General Michael Hayden
Last month in my blog post, Executive Briefing with Former DHS Secretary Michael Chertoff, I described an executive breakfast event held by Mandiant in Houston. On February 22nd Mandiant conducted a...
View ArticleLumeta Announces IPsonar 5.4
New offering highlights areas of the network edge that intruders can infiltrate to potentially leak customer data, intellectual property and more out of enterprise networks
View ArticleLeading Cybersecurity Certification Groups Form Industry Collaborative
Cybersecurity Credentials Collaborative priorities include advocacy, research, and improving skills
View ArticleEMC Helps Customers Enable Trusted IT With Five New Security And Risk...
New services help organizations ensure their information is secure, regulation compliant, and meets business requirements
View ArticleSurvey Says 51 Percent Of Organizations Lose Data Through Mobile Devices, 59...
Mobile devices help business, but security is needed to prevent costly data loss
View ArticleRSA Conference Thoughts: Part I
Yesterday kicked off another RSA Conference. I was honored to attend the eFraud Global Forum. The caliber of presenters and attendees at this event is always fantastic. There have already been some...
View ArticlePayPal supports reform at the CA/Browser Forum
PayPal is pleased to note the creation of a working group at the CA/Browser Forum to address rechartering itself as a more mature and capable organization with a broader scope of action. We are...
View Article