Websense Redefines Mobile Security By Combining Industry-Leading Web And Data...
Websense TRITON Mobile Security combines four key elements
View ArticleWebsense Security Labs blog is an award winner!
We are very pleased to announce that our Websense Security Labs blog has just won the coveted "Best Corporate Security Blog" award at the SC Magazine 2012 awards. The awards were announced at the RSA...
View ArticleThe Three Stigmata of the PCI DSS
At the RSA Conference yesterday I was reminded of The Three Stigmata of Palmer Eldridge, a science-fiction book by Phillip K. Dick. This book describes a dystopian future in which people escape into...
View ArticleMy1Login Offers Free Login Vault
my1login personal portal offers password management integrated with a dashboard for email and social media
View ArticleKindsight Unveils Mobile Security Solution
Solution combines network-based threat detection and a native security app
View ArticleHow To Catch A Phish: In Time For National Consumer Protection Week, Visa...
Visa offers the following advice for consumers to avoid getting caught by the phishing hook
View ArticleHow To Catch A Phish: In Time For National Consumer Protection Week, Visa...
Visa offers the following advice for consumers to avoid getting caught by the phishing hook
View ArticleSE 101: The RSA Affair
Meanwhile in social engineering news, comes this mildly interesting snippet of less-than-sufficient physical security management by a security conference; and the award goes to - the RSA Conference...
View ArticleFrom Zero to Fully Provisioned Application in Minutes – Part 1
Imagine you want to rollout a new business application in your organization? How long does it take? How many steps are there along the way? If we think about it, rolling out a new application usually...
View ArticleSMB cyber security: we feel your pain – RSA day two
Day two of the show, and we ask vendors and participants what the pain points are for Small and Medium Business (SMB), especially in the category from 25 to 250 member organizations, even narrowing...
View ArticleThe Causes of and Solutions for Security Burnout
Are security professionals burning out at a faster rate than their non-security IT counterparts? If so, what can be done to solve the burnout rate?
View ArticleNitrozac and Snaggy: iPad 3 Facts
via the comic genius of Nitrozac and Snaggy at The Joy of Tech™
View ArticleEvent: FIRST Conference in Malta
One conference to watch out for on the Maltese islands next June is the 24th annual Forum of Incident Response and Security Teams (FIRST) information security conference. Spread over 5 intensive days,...
View ArticleThree (Totally Legal) Strategies for ‘Fighting Back’ Against Cybercriminals
The idea of ‘fighting back’ against hackers is both scary and risky business. Most security professionals would strongly advise against it, in part because one false move could land you behind bars....
View ArticleWhat is CEE-enhanced syslog?
I just did a quick presentation on what cee-enhanced syslog actually is and how it works. I suggest to have at least a peek, as this format will probably become very important in the future. But why...
View ArticleYou don’t have to always be the bad guy
So, Zenprise is saying that most of their clients are buying Mobile Device Management (MDM) tools to block stuff such as Angry Birds and Facebook, due to productivity issues, instead of doing real...
View ArticleDo the bad guys make the best good guys? (Doing business with hackers)
Can the zebra change it's stripes? If you're a black hat hacker, will you always be one? What if you're one of those "I messed up, I was busted, did time, but now I'm a good guy, trust me" types ... do...
View ArticleCISSP reloaded Domain 4 – Cryptography
This is the 4th part on my CISSP Reloaded where I am revisiting the 10 CISSP domains I studied for many years ago to see what has changed and how much of it I have retained as well as adding … Continue...
View ArticleTrustworthy Computing: Learning About Threats for Over 10 Years – Part 2
In part 1 of this series I started comparing what the threat landscape looked like at the turn of the century to what it looks like today. Continuing that theme, today we have released a new special...
View Article