Login  |  Register  |  Contact
nsa heartland payment systems incident response red herring immutable logs amazon rds data labels acquire andy the it guy virtual private storage pwn2own cio proxy encryption programmatic security ibm websense rsa 2014 medical director of cybersecurity litecoin 0day tokenisation specification aza market forces walmart code analysis asset recovery alessandro acquisti message security australia chip and pin mobile security google drive ios 7 off-balance sheets arcsight secure web development 2014 open source survey intrusion deception cloud files virtualiron pki jbig2decode waf web filtering data valuation security investment webinar ssn access-logins hipaa online merchants slammer consensus audit guidelines sdlc tte tools software liability dan kaminsky yahoo pragmatic cso storage attack design flaws scope reduction spam haiku tipping point humor piv conti macalope splunk square project quant april 2009 cpu workaround paranoia meter aberdeen cnet hsm pragmatic data security blackhat nessus third test hoff virtual appliance cmp gatekeeper security guidelines joshua corman full packet capture vista sentrigo merchants computer underground mountain lion google china fiserv db-dos margarita qa security controls key management byod hannaford security market passport data heartland oracle world techtarget research internal threat anti exploitation emergent chaos postini esi digital certificates database activity monitoring software faith sql injection protection iplocks kaminsky bug at&t josh corman pci tde security management best practice adobe flash mozilla home equity fraud risk quantification civil rights ebay cag security mindset pci-dss identity and access management appsec ewallet oracle audit external procedures internet redesign network security management sds phishing netezza breach notification palo alto networks information governance new zealand los alamos sopa rights management innovation stealth photograpghy openstack insurance bit9 medicare database encryption mobile payment security asv nsa, rsa, cyberdouchery gui s3cmd beyondtrust defcon lifecycle database vulnerability assessment internet explorer target spam glance eweek playstation network breach google spying core impact schneier totally transparent research quantification hadoop observatory project tjx ngs training xss secure computing adobe mandiant breaches information sharing kindle open source hardware symantec evasi0n anti-piracy aladdin password manager smart card security cognitive science digital ant swams purchase hp network dlp va database virtualization guardium morro economic downturn dat loss prevention robert "rsnake" hansen web application firewalls melissa hathaway identity theft inference attack asset management csa personal sector hacking automation closed zerodium venture capital whitepaper pa-dss antitrust network ipad nosql injection project security data loss proxy dox toolbox cloudera purewire big data security x.509 csrf source boston 2009 directory servers entrust risk assessment antivirus imac rod beckstrom sice retrospective juniper washington post securid big data breach information security application dos ie 6 cloud encryption ultimately, competition is good. suricata will likely push the snort team to advance their technology faster than in the absence of an alternative. but it's a bit early to load the snort pig onto the email encryption iphone 3gs os x anti-exploitation palisade iphone dam 2.0 forgery sonatype data breach outbound network control anonymouse users cloud identity sox incident respons best practices database audit logic flaws goggles ciphercloud ios information-centric cloud database dos vulnerability abstraction ab 1291 software defined security cpr flash patch dam rsnake robin harris skeptics guide to the universe netflix guardianedge everything’s broken target breach credit card trend secure audit logs dvd response inflection trend micro watchdox sprint business software alliance process control systems email help a reader visa adam shostack, chris hoff, david mortman, james atkinson, peter kuper, source boston online medical records ie mail marshal data breach investigations report portal security compucredit admin rights iaas vulnerabilities richard bejtlich dba amazon charges information lifecycle management datacenter red database security randall stross bitlocker redlining devops external encryption rich mogull research agenda datacard auditors secureworks vdi owasp aviator browser ec2 webcast parallels 4.0 mi5 networks gae amazon aws tracking software monitoring 3d printing pink secure360 dr. lawren smithline static analysis tool web 2.0 mobile hspace="10" vspace="10" totally google dashboard security bloggers meetup vmware disclosue solaris felonspy data breach costs ediscovery cyberdouchery messaging mike andrews metrics web browser security parallels web app assessment windows passwords cloud data lifecycle security engineering password hashing fbi coyotes clickjacking ietf enterprise key management ingenix fidelis banking rsa conference disruptive innovation big data oracle cpu direct message agile program management honeynet project doj vector glba jimmy buffett application monitoring aric exploited pdf fubar bug bounty instructional axway rogue it mdm evm security awareness sidejacking sap shawn moyer security training virtual desktops kevin rowney app security wireless security digital evidence first data corporation advanced persistent threat microsoft security advisories exploit mitigation content monitoring and protection clear database noscript jesse krembs security metrics microsoft sql server chef preboot authentication rim mi6 rapid7 sdn penetration testing safari network forensics column encryption linkedin pin crackers missing computers blogroll but it brings up a bigger issue of when a technology is _dead_. in reality, there are few examples of products really dying. if you ended up with some consentry gear, then you know the pain of product cybersecurity img dcma api gateways mvalent security rules operationalization of security cloud iam fcc pin porn black friday sql server trace chris hoff forensics anti-spam saas hfc informer lumigent threat level u.s. sega tidbits twitter hack data security cycle neil macdonald george holtz immunity canvas banned passwords oracle cpu july 2011 breac adaptive authorization plans deep packet inspection digital wallets github syrian electronic army lockheed dominique levin software audit foo vaultless tokenization touch id disclosure american express flash crash exploits chris peterson halloween rsac 2010 syslog there are no trusted websites procedures sim bill brenner database scan emr it world information centric security sopra group exaprotect saas lazy ass certification date breaches amazon simpledb fud social security awards future of security social security numbers risk filefolder encryption jeremiah grossman micro-payment july 2009 mit dean government robert carr consensus metrics feltbot not selling tcp contingency planning neighbors secure sdlc how bitcoin works upgrade os x 10.8 gatekeeper terror database bitcoin investigations summary vivendi micro payment segregation cybercrime eiq cpu api gateway bad stock tips convergence security policies media protection sgx hack ssl ssdlc apt privacy secdevops bug bounties rock social networking cisco fis breach data protection decisions database vulnerability secure code development ben tomhave database assessment db2 event monitor center for internet security whitehat security science based security quick wins scansafe core security standards scam marker advisors oracle 0-day volume encryption malware response sem mx logic funny if true dysfunction column forrester adword xml security national information security association ccsk keating 5 felix leder tokenization voltage risk management low hanging fruit enterprise drm survey cyberwar radiant systems electronic medical records economics clear text passwords 1password same origin industry software defined network david mortman nitro disaster recovery gunnar peterson dark reading agile development tech target emt cloud, cloud security, database security, security automation infrastructure security healthcare trust id ale jeff jones policies wired magazine analyst mobile auth flashblock web application security log management friday summary mccolo data collection vontu emergency medicine security in the cloud business trustworthy computing 0-day application and database monitoring and protection consumerization of it block level encryption public user election conficker open source development survey tsa security analytics star trek mike bailey stay safe phoenix toorcon open source survey microsoft sdl knox session virtualization hype identity management cloud security dlp oauth outcomes based security rsa nitrosecurity malware elastic block storage nominum mobile identity opendlp sybase phone home change password fico score appliance vs. software mailgate swift ralph gross critical patch tls scareware security focus governance wired trinity cloud storage management stolen data renegotiation tillmann werner vpn visual forensics consumer drm data centric security data security survey remote data wipe tizor peter kuper imessage sans saas encryption security future denial of service mbta location-based privacy security innovation sql server sales mastercard greg young information warfare distributed encryption android thomas jefferson paypal mobile 1st piracy trial warrantless wiretap ssl-vpn gazzang firesheep targeted destructive ciso temporary credit cards tutorial networking file activity monitoring siem 2.0 lawsuit secureid ebs application development roles security industry vu oracle owasp 2011 paper qualys cloud computing datacenter encryption security incite vormetric aurora attack messaging security safe browsing predicions flash risk metrics pdf api management ed bott lancope data security lifecycle dos virtual database patching anton chuvakin palo alto cloud compliance network security rand data breaches 7 myths fingerprint new york times janet napolitano safenet zdnet privileged user management connections mike rothman dbquant aslr field encryption cvss scoring geni volume storage amazon s3 msrc ev9 content analysis sunsec espionage marshal8e6 iam losers blackberry abac av fam new school slime marshal arizona music waf+va hacks microsoft maverick toilet seat database monitoring ids fail format preserving encryption transparency patch tuesday admin database security dlp light networkworld atm radio cis2013 paypal mobile app security file encryption weak passwords emv safe online shopping s&l microsoft critical vulnerability database configuration assessment imperva facial recognition database breach transaction authentication adaptive authentication security counterculture ecc sarbanes-oxley mcafee cyberattack anti-disambiguation bastion jailbreak cash azure european commission fired statstics fraud ddos oval virus pii truecrypt stupidity cyberterror rsa guide patent troll anti-malware career auditing prices alan shimel trustwave slip object storage vulnerability assessment behavioral monitoring compliance strategy verizon breach report scrum lenr information-centric security glass social engineering burton physical security key manager enterprise key manage cal source code review certificate authority dns facebook immunity market size firefox economist sso untitled dnssec hypersegregation new york table encryption getting started in security siem nosql tokenization guidance mobile device management employee theft 60 minutes state department snake oil twitter worm martin mckeay active defense idiocy intel bit.ly data mining nba annualized loss expectancy injection alex hutton rbac wpa edrm 451 event driven security standard user mode organizational destruction messagelabs isolation agile failure bryan sullivan rant software guard extensions browser security e10+ anonymized data computerized patient records david litchfield worker sql azure web hacking activity monitoring orchestration thomas ptacek object encryption grc gartner oracle database patches debix storage dlp exploit data harvesting politics react faster and better csa guidance securecloud gce ruby virtualization emvco database sfo home security peter galli diginotar tenable business continuity planning solidcore systems honeypot pgp aws ie 7 sql injection loglogic admp barracuda rippletech data liberation org outsourced security amazon ec2 nosql security navajo systems breach report tripwire epsilon debit card fraud waf + va threatpost compliance avdl protegrity design research calendar aclu stolen virtual currency web app security avinti tumbleweed data security dam appliance flashback cloud washing security assessment logical fallacy acquisition nick selby check point web application firewall incident management mobile device security nisa securosis phi rootkits hyder assume stones skepticism double standards whitepape