No Victims File: Betting Against Compromise
Thanks to Lori’s weekly news feed from The Lemonade Stand, a vendor promo article from Dark Reading caught my eye – Most Security Pros Wouldn’t Bet On The Security Of Their Networks. I won’t quote from...
View ArticleMoney$ec Evolved Slides
My first BSides will not be my last. A huge thank you to all the sponsors and volunteers. The BSidesSF folks will publish links to the recording and slides but I’ve had a few requests that couldn’t...
View ArticleMake a Difference Webinar with Caliber
Apologies for not linking to my webinar with Tab from Caliber Security. It’s a fun filled 45 minutes with me jawing on about prioritizing and measuring risk. Who doesn’t want more of that… Event...
View ArticleWaging War in the Digital Age
What are the ethical ramifications of waging war via computer? Does war even have to be declared? Where are the boundaries in the virtual world? What happens when machines begin to think for...
View ArticleInfoSec Daily Podcast Episode 609
Episode 609 - Sexy Career Paths, Friday FUD, 8 Stolen Bitcoins, WOA Stillbirth? and Infiltrated
View ArticleSBN Sponsor Post
Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l
View ArticleRevamped Privacy Policy Leaves Google Users With (A Few) Options
No stranger to privacy issues, the search giant Google seems to have taken an even bigger page out of Facebook’s manual lately. And privacy advocates are revving their engines. Google’s newly rewritten...
View ArticleCAPTCHA Re-Riding Attack
CAPTCHA Re-Riding Attack bypasses the CAPTCHA protection built into the web applications. The attack exploits the fact that the code that verifies CAPTCHA solutions sent by the user during form...
View ArticleSecuring SSL and Implementing Cryptography
The next OWASP London will be at Royal Holloway (University of London) on Tuesday 8th March starting at18:30 hrs. Tobias Gondrom will be speaking about "Securing the SSL Channel Against...
View ArticleCSO Column: Finding security’s opportunity to engage
This column shares a true experience from over a decade ago and the insights I’ve learned over the years on more effective ways to engage people in the practice of protecting information. This is an...
View ArticleGoing back to the stack.
In the spirit of trying to suggest solutions, here are a couple of thoughts about what an enterprise can do first off to make security a little better.It's bothered me that infrastructure is being...
View ArticleJacadis Security Administrator Position Opening
We have an opportunity to assist a client with a security administration project. A detailed job description is attached. In summary we are looking for a top performing windows administrator with...
View ArticleStuck in Captcha Hell: When Security Disables
A captcha popped up questioning my credentials. “Darn, I hate when this happens,” I thought. “No worries, I’ve been through this security checkpoint before.” I typed in the two different words with the...
View ArticleNitrozac and Snaggy: Keep Google from Watching…
via the comic genius of Nitrozac and Snaggy at The Joy of Tech™
View Article"It’s not illegal if you consent" – malware’s dirty little tricks
In a conversation with Chris Hadnagy yesterday, which will be released as a podcast shortly (and trust me you're not going to want to miss this episode!) we tripped over this little trick that malware...
View Article