Login  |  Register  |  Contact
blogroll datacenter encryption tizor tidbits content discovery missing computers security policies security investment phoenix gce messaging security bryan sullivan consumerization of it microsoft sdl dan kaminsky fpe passwords rsnake research calendar security controls avinti sony breach dhs dark reading netezza information lifecycle management schneier email encryption logic flaws geni employee theft nmap gatekeeper ie media encryption malware annualized loss expectancy endpoint dlp style="border: 0px solid ; float: right;" hacks snake oil stupidity anti-spam information governance incident respons social security awards paypal mobile software defined networking data collection ids breach notification homomorphic encryption new school datacard security management amazon activity monitoring project security qa breac security counterculture tutorial new york times martin mckeay center for internet security object encryption assessment secure code development safe browsing orchestration chris hoff safe online shopping dysfunction pptp dropbox hearland trust id file encryption vaultless tokenization nominum network security target breach clear text passwords online pharmacies humor totally sybase s&l enterprise key manage compucredit stay safe security antisqli api management anton chuvakin politics pin crackers enterprise drm swift securosis same origin visto ed bott imessage cloud compliance datacenter banned passwords dat loss prevention metasploit assume rapid7 there are no trusted websites music sales feltbot scope reduction peter kuper lazy bad stock tips bastion tripwire flash rant phi data encryption open source code analysis pink targeted destructive mandiant thomas ptacek neighbors evidence based risk management microsoft security advisories wired consumer drm mccolo patent troll iphone transaction authentication digital wallets twitter worm ssl ietf dr. lawren smithline ccsk consensus audit guidelines social engineering untitled external encryption logrhythm tsa porn closed pci 2.0 photing faith api abac training barracuda networks 0day mdm ingenix keating 5 security rules investigations dynamic analysis epassport couterintelligence standards asset management playstation network breach black friday stones ncsc april 2009 cpu exploit mitigation data breach investigations report networkworld breach data security industry smart card security web browser security skepticism data breach costs content monitoring and protection thomas jefferson digital evidence microsoft critical vulnerability exaprotect conficker antivirus risk management litecoin cybercrime state department sarbanes-oxley sice source boston 2009 disaster recovery jeff jones acquisition rich mogull imac av web 2.0 csrf dox media protection verizon coyotes nuclear weapons forensics cansecwest tipping point mvalent contingency planning data security lifecycle radiant systems mastercard peter galli first data corporation mozilla simplified sdl parallels 4.0 dvd trend micro medical firefox ios 7 dam 2.0 virtual desktops ssl vpn microsoft exploit director of cybersecurity sunsec mobile payment security penetration testing idiocy password hashing toolbox database scan elastic block storage lockheed sexual harassment panda sprint pci dss security engineering risk metrics ecc rbac roles immutable logs clear database api gateways how bitcoin works ben tomhave umg research bug bounty organizational destruction toilet seat ibm alt="thing you won't find in my backyard...." volume storage dbquant robin harris cvss scoring rms waf aslr youtube devops database dos open source hardware remote data wipe felix leder rippletech gae walmart cisco apple va ssl-vpn debix directory servers aladdin maverick oauth asset recovery bit.ly amazon aws ryan naraine oracle world forgery db-dos federation esi dba cloud files joshua corman best practices core security incident management university of california data protection decisions mx logic proxy patch management segregation low hanging fruit epsilon barracuda getelementsbytagname compliance micro payment network security management entrust greg young cloud washing internal threat threat level ioug direct message securid rsa 2014 qualys risk quantification cis2013 xss hacking open source survey sql server trace web filtering database vulnerability assessment sans security metrics mailgate economics secure enclave e10+ statstics bill brenner proxy encryption sonatype ngs information centric security secerno off-balance sheets outbound network control neil macdonald pragmatic data security data breach triangle purewire alex hutton oracle audit external procedures cmp event data quick wins disclosure hadoop security ncircle rese application monitoring user security social media george holtz block level encryption format preserving encryption doj tillmann werner security future vormetric amazon rds pdf google dashboard diginotar db2 audit data label cio survey source boston tokenization hypersegregation venture capital database activity monitoring software july 2009 application security inc. twitter design flaws anti-malware eff data protection market size sopa storage dlp personal ponemon social networking mac anti-exploitation 0-day database assessment tools mobile auditing lancope outcomes based security pragmatic cso national information security association agile development fico score email vulnerability s3cmd cognitive science robert patterson convergence chip and pin cloud operationalization of security linkedin transparent encryption metrics mbta rogue it palo alto networks api gateway cloud security alliance app store anti exploitation anti-disambiguation techtarget networking response vulnerability assessment music piracy aric probability sun syslog business continuity planning software audit hoff sega amazon ec2 denial of service european commission amazon web services sim gunnar peterson paypal cpu cloudera cyberdouchery pki intrusion deception oracle database patches tokenisation specification drm funny if true 3d printing static analysis tool hybrid application encryption virus big data security mobile device management digital rights management policy blackhat passport data information-centric security project quant connections mobile security sap bitlocker career friday fde aurora attack hardware security module facebook at&t virtualiron session virtualization protegrity big data immunity canvas online merchants sector openstack debit card fraud database encryption palo alto digital ant swams hipaa home comupting ipad getting started in security risk secure audit logs insurance halloween incident response full packet capture iplocks siem 2.5 cyberterror fud mobile auth github critical patch column worker aws aclu outsourced security verisign honeynet project trinity beyondtrust dean marker advisors cpr macworld emt goggles nosql injection database security platform cloud, cloud security, database security, security automation toorcon josh corman hfc informer ssdlc mobile identity esther schindler cloud encryption security bloggers network slime jbig2decode immunity virtualization security assessment ciphercloud u.s. portal security core impact rsa storage summary flashback twitter security programmatic security jeremiah grossman privileged user management information warfare david litchfield breach report bug bounties whitehat security cybersecurity design patterns exploits vulnerabilities web application firewalls avdl chef bbc news jimmy buffett data mining standard user mode ebs adam shostack, chris hoff, david mortman, james atkinson, peter kuper, source boston arduino computer underground election banking emergent chaos browser security lumigent behavioral monitoring tokenization throttling monitoring intel hype mike rothman 2014 open source survey iam future of security alan shimel automation rod beckstrom first steps 7 myths quantification micro-payment ios data breaches csa key manager ciso column encryption shawn moyer web application security sidejacking governance cloudflare wpa owasp oracle cpu july 2011 andrew jaquith xp_ national cybersecurity privacy static analysis mit washington post sem security bloggers meetup tracking software app security antitrust cyberattack anonymized data nick selby recency bias stolen laptop zerodium vu java patch encryption database audit credit line fraud agile failure oval evm adobe upgrade siem advanced persistent threat management by complaint security training appsec amazon s3 gsw hoops scada date breaches hsm react faster and better secure sdlc clickjacking nosql sso gazzang cloud computing pre-boot twitter hack purchase vmware law provisioning plans tumbleweed atm rsa guide glance kevin rowney dlp dominique levin define big data transparency iphone 3gs lawsuit os x 10.8 gatekeeper digital certificates but it brings up a bigger issue of when a technology is _dead_. in reality, there are few examples of products really dying. if you ended up with some consentry gear, then you know the pain of product possibility inflection developer tools application finjan ediscovery dcma software liability mel torme palisade tls loglogic sentrigo network friday summary totally transparent research credit card fraud dns touch id economic downturn best practice exploited pdf injection x.509 square forrester china target threats big data breach rsac 2010 facial recognition emergency medicine nba trustwave adobe flash img red herring new york medicare guardium rim sql injection distributed encryption open security foundation xml security opendlp mountain lion los alamos stolen data rober tte ev9 identity and access management cnet mobileme help a reader espionage virtual appliance consensus metrics mobile app security aza oracle cpu hp adaptive authorization security incite risk assessment cash honeypot webinar pii scansafe stealth photograpghy security in the cloud payment security secureworks sfo nosql security vdi data loss internet redesign robert carr software defined security pci is the devil binary forensics db2 event monitor betanews iaas network forensics fam pci-dss american express jailbreak bit9 innovation google spying vista agile 451 sql server lambda 1password sds red database security information sharing virtual database patching marshal8e6 crisis communications emv voltage content analysis appletv single sign on evasi0n morro dsp identity management vpn analyst information-centric user encryption open source development survey rootkits siem replacement security analytics rand scareware prices hannaford eiq noscript paas data labels industry apt piv paper not selling security markets dmv transparent application and database monitoring and protection pen test scam secure computing security mindset nsa, rsa, cyberdouchery proofpoint sybase audit security breach infrastructure security attack java tcp rights management black hat robert "rsnake" hansen admin heartland cyberskeptic public user location-based privacy botnets virtual currency logical fallacy ultimately, competition is good. suricata will likely push the snort team to advance their technology faster than in the absence of an alternative. but it's a bit early to load the snort pig onto the retrospective appliance vs. software hyder dos extproc data liberation org fail data masking gartner information security data security cycle enterprise key management whitepape check point ssn firesheep cag internet explorer trust nitrosecurity clean slate macbook secureid corporate online medical records flashblock table encryption data loss prevention password manager redlining dam secdevops saas encryption amazon simpledb email security development messagelabs mogull's law navajo systems brian krebs mi6 ebay syrian electronic army key management pwn2own change password mail marshal owasp 2011 ddos waf+va application security merchants burton pgp compliance strategy sql observatory project wired magazine cloud storage electronic medical records ec2 social security numbers pa-dss zero day integrigy ralph gross asv google chrome sopra group third test phone home warrantless wiretap windows process control systems emr security research csa guidance richard bejtlich security focus cal spam watchdox economist cloud-init abstraction object storage nisa buss count hackers for charity solaris security awareness mcafee safari yahoo rackspace fortinet rsa 2011 android fired database monitoring everything’s broken australia glba marshal dam appliance secure development spam haiku conti ie 6 perspectives web security stolen government siem 2.0 science based security adaptive authentication ewallet safenet kaminsky bug acquire bpo nsa management glenn fleishman isolation aviator browser role based access control fbi david mortman transparentexternal encryption fingerprint network dlp bitcoin s3 business justification for data security market forces mi5 networks blackberry psychology star trek janet napolitano secure360 charges web app security data centric security mobile device security api security inference attack cloud security predicions data breach ruby