Login  |  Register  |  Contact
protegrity open source development survey mobile payment security project security active defense iam qualys scada ics virtual currency debit card fraud db2 event monitor dnscrypt msrc low hanging fruit new york lazy big data security lancope jeff jones whitepaper online medical records atm state department csa q1 bbc news proofpoint coyotes spam injection gazzang emt slip dvd change password phone home amazon aws mountain lion rober breac homomorphic encryption virtual desktops pdf application content discovery josh corman sun database monitoring andrew jaquith economics data breach triangle dan kaminsky outbound network control cyberattack internet redesign trend micro safenet target breach there are no trusted websites eweek software defined networking appliance vs. software federation siem replacement sql server inflection feltbot dr. lawren smithline browser security friday summary economy gartner sds incident respons transparency getting started in security webinar user security business continuity planning market size microsoft security advisories marshal observatory project bitcoin alt="thing you won't find in my backyard...." ncsc google microsoft sql server secure360 flash patch 0day cloud computing analyst application and database monitoring and protection cpu pwn2own rim access-logins scrum rapid7 alex hutton kevin rowney ev9 microsoft dsp roles credit line fraud ralph gross survey worker anti-piracy mail marshal techtarget react faster and better scareware siem blackhat mbta outcomes based security personal pki security industry retrospective safari nitro new school aviator browser corporate pii abstraction waf sice information centric security venture capital open source hardware dam 2.0 byod disclosue database messaging washington post tte cognitive science consensus audit guidelines open source security breach agile program management secure audit logs rackspace zdnet spam haiku data security survey os x source boston 2009 oracle world digital ant swams cansecwest behavioral monitoring inference attack log management industry sales credit card fraud ab 1291 quantification intel randall stross incident response process control systems wired magazine media protection secerno trustworthy computing ssdlc breach notification rbac slime emergency medicine sarbanes-oxley future of security security awareness aric jimmy buffett activity monitoring security source boston risk software defined network vu rese dba trustwave ssl mobileme websense volume storage design red herring object encryption safe browsing devops prng clean slate amazon simpledb twitter hack marshal8e6 cio anti-disambiguation network litecoin fraud aza crisis communications cloud security java security management paper imac botnets information warfare application security data breaches tracking software berkeley mobile outsourced security same origin auditors data labels immunity canvas privacy honeypot wake forest summary american express warrantless wiretap patch management 60 minutes china evasi0n snake oil robert patterson tillmann werner security focus chrome developer tools market forces forensics plans anti exploitation facebook social engineering nosql burton event data extproc hyder medicare eiq rsac 2010 ebay information sharing programmatic security integrigy recency bias business verizon ios stupidity cloud washing mx logic nba rock encryption july 2009 passport data sap arcsight security bloggers network sony breach syslog cybercrime swift thomas jefferson rsnake cmp robert carr micro-payment software defined security provisioning lifecycle assessment date breaches data breach costs data loss prevention walmart information-centric malware response splunk api gateways ranting roundtable cloud, cloud security, database security, security automation scam stealth photograpghy renegotiation user encryption cloud data lifecycle 3d printing fail facial recognition software audit noscript wired lockheed iaas xss banned passwords twitter paypal music piracy imperva macbook pptp data security stolen data emv secureworks monitoring politics sega cloud security alliance full packet capture application monitoring transaction authentication pre-boot flashblock cloud iam exploits sim pin crackers terror database denial of service credit card anton chuvakin quick wins ingenix photing lenr vpn funny if true netezza rogue it hearland piv security investment dat loss prevention couterintelligence fired arizona orchestration virus science based security kaminsky bug asset management research sentrigo porticor government object storage cyberskeptic rich mogull securecloud anti-spam ooda loop foo db2 audit ssn evidence based risk management xeround robert "rsnake" hansen data breach ecc whitepape asv simplified sdl mobile device security google drive skeptics guide to the universe smart card security research agenda safe online shopping consumer drm marker advisors media encryption oauth compucredit consensus metrics probability lawsuit evm core security privileged user management nosql security secure code development x.509 cloud compliance logical fallacy web hacking hspace="10" vspace="10" totally transparent research api gateway ciso security counterculture mobile auth new york times mobile identity anonymized data static analysis trustzone nisa missing computers patent troll postini clear database virtual database patching owasp heartland payment systems procedures gui data protection decisions web application firewalls computerized patient records data mining jailbreak ietf intrusion deception column encryption greg young ruby opendlp pgp ngs project quant s3 paypal mobile visto gatekeeper ec2 secureid preboot authentication critical patch ed bott elastic block storage esi tde proxy saas encryption data loss datacenter encryption bastion mogull's law workaround database vulnerability xml security university of california cloud red database security big data key manager disaster recovery ponemon secure sdlc risk management adaptive authorization center for internet security compliance data liberation org vulnerabilities porn blogroll epassport attack breach margarita mcafee whitehat security untitled transparent investigations psychology google chrome oracle 0-day tipping point cynicism rsa 2014 logic flaws scope reduction anti-exploitation bug bounty mike rothman medical but it brings up a bigger issue of when a technology is _dead_. in reality, there are few examples of products really dying. if you ended up with some consentry gear, then you know the pain of product database dos forrester siem 2.5 antisqli home comupting dmv kindle web security incident management micro payment security engineering dep trend security markets oracle cpu mailgate img full drive encryption dlp jbig2decode cag block level encryption chef stolen laptop pa-dss emvco mobile device management vdi pci nick selby cloudflare adaptive authentication fico score everything’s broken static analysis tool rsa adobe purchase field encryption schneier security future data breach investigations report amazon web services phil collins edrm crashplan black hat chip and pin advanced persistent threat gae mi6 social networking sql injection digital rights management blackberry development possibility instructional digital certificates tokenisation specification file encryption acquire macalope career data harvesting patch tuesday dbir content monitoring and protection rod beckstrom security analytics adam shostack, chris hoff, david mortman, james atkinson, peter kuper, source boston google spying breaches ewallet prices hypersegregation paranoia meter rights management admin internal threat identity and access management trust help a reader shawn moyer epsilon securid barracuda david litchfield defcon pci dss open source survey database vulnerability assessment 2014 open source survey information governance security research ibm tsa agile visa innovation it audit insurance peter kuper nuclear weapons u.s. security assessment ale adobe flash amazon s3 vector not selling saas fcc enterprise key manage public user sdn data centric security ass certification eff ioug mel torme barracuda networks iphone upgrade secure computing compliance strategy network forensics weak passwords employee theft agile failure tls european commission database breach loglogic tumbleweed security bloggers meetup microsoft sdl transparentexternal encryption tenable define big data new zealand cyberterror aberdeen owasp 2011 at&t google dashboard sql azure security controls business justification for data security phi tripwire openstack agile development dlp light ncircle oval vivendi penetration testing tjx dam appliance sexual harassment panda amazon ec2 dam economic downturn twitter security tidbits oracle database patches aurora attack buss count rootkits vontu standard user mode navajo systems disruptive innovation network dlp database audit diginotar ediscovery voltage exploited pdf security market tokenization throttling sopra group hannaford hadoop axway skepticism securosis oracle audit sdlc getelementsbytagname phishing convergence mobile app security nessus webcast nitrosecurity fpe rsa 2011 api security dysfunction operationalization of security it world security in the cloud hipaa hackers for charity datacenter api management governance linkedin glba firesheep hardware security module nosql injection external encryption ultimately, competition is good. suricata will likely push the snort team to advance their technology faster than in the absence of an alternative. but it's a bit early to load the snort pig onto the cloud storage apt cloud identity ids rsa conference secdevops tech target application encryption deep packet inspection storage dlp source code review policy mi5 networks mobile security data encryption appsec style="border: 0px solid ; float: right;" m86 flashback fam data classification metrics radio binary forensics web filtering dbquant amazon rds dynamic analysis grc requestpolicy proxy encryption dropbox bit9 email security mandiant stolen fidelis data label slammer sql server trace scansafe sans waf+va esther schindler identity theft visual forensics first data corporation security training stay safe temporary credit cards truecrypt application security inc. sql injection protection format preserving encryption s&l role based access control toolbox transparent encryption nominum ie 6 cisco australia security theater hsm admp ciphercloud bryan sullivan national cybersecurity brian krebs computer underground physical security predicions flash crash payment security threats how bitcoin works home equity fraud fubar management by complaint banking social media location-based privacy glenn fleishman thomas ptacek rsa guide email cloud-init merchants hype distributed encryption social security numbers tools jesse krembs check point ssl-vpn mac solaris acquisition network security cnet april 2009 cpu parallels ebs betanews twitter worm pci is the devil beyondtrust azure android remote data wipe ccsk database activity monitoring infrastructure security csrf database configuration assessment database virtualization pci-dss sunsec best practices firefox dns information security va first steps breach report identity management anti-malware redlining david mortman dox csa guidance networkworld pin totally mccolo tizor watchdox zero day big data breach verizon breach report sso double standards java patch security incite idiocy 1st piracy trial file activity monitoring mike andrews hfc informer wpa security policies xp_ annualized loss expectancy secure development directory servers aladdin dnssec dark reading playstation network breach contingency planning drm geni cpr mit networking virtualization information lifecycle management content analysis solidcore systems macworld finjan ipad umg passwords nmap os x 10.8 gatekeeper immutable logs bill brenner halloween los alamos filefolder encryption rant avinti skybox cloud encryption guardianedge oracle critical patch key management pragmatic data security electronic medical records bad stock tips security innovation threat level paddy hacking business software alliance entrust database assessment joshua corman amazon dean healthcare star trek data security cycle sgx guardium open security foundation single sign on app security risk metrics fingerprint richard bejtlich phoenix goggles data collection lumigent debix sopa consumerization of it application dos online merchants rippletech mastercard endpoint dlp cyberdouchery exploit mitigation external procedures peter galli standards enterprise key management network security management software liability malware cybersecurity neighbors cvss scoring emergent chaos siem 2.0 off-balance sheets 1password mike bailey storage hadoop security heartland app store square social security awards hack antitrust database scan cyberwar web browser security home security 451 application development losers session virtualization palisade av bitlocker 8e6 election data security lifecycle security rules admin rights morro rms symantec abac aslr ben tomhave organizational destruction cloudera netflix statstics full disk encryption online pharmacies vulnerability auditing charges windows