Login  |  Register  |  Contact
dsp anti-piracy paypal cnet dcma 2014 open source survey anti-spam quick wins anti exploitation networkworld business justification hacking warrantless wiretap scada photing mobile app security process control systems dynamic analysis ietf design cyberskeptic innovation fde netezza github home comupting style="border: 0px solid ; float: right;" trustwave security training big data security consumerization of it google chrome social networking cis2013 anti-disambiguation purewire marker advisors proofpoint rsa 2011 information warfare star trek google dashboard facial recognition joshua corman heartland ebay parallels 4.0 siem 2.5 research american express consumer drm walmart database scan zbot secure enclave porn double standards datacenter sql injection protection api risk data masking security engineering data mining vdi whitepaper devops economics ecc forensics chip and pin rod beckstrom pci dss big data breach playstation network breach macworld fiserv crisis communications dvd patch management cpr peter kuper waf mcafee loglogic av netflix paypal mobile database security research sopra group user security mi5 networks security innovation trust xml security australia nosql risk management security market arizona firefox provisioning securecloud vector chef fcc bitlocker messaging rsa buss count ssn diginotar jesse krembs 451 techtarget pragmatic data security abstraction cio jeff jones mobile payment security noscript governance assume computerized patient records corporate security investment ie aza scam log management washington post policies micro payment wired magazine sgx training appletv internet redesign ie 7 los alamos single sign on source code review securid message security annualized loss expectancy survey low hanging fruit edrm gartner digital evidence palisade hp juniper dnssec morro ibm vormetric tokenization guidance berkeley compucredit ssl immunity cloud identity toilet seat brian krebs open source survey media protection music stones operationalization of security tokenization throttling upgrade mike andrews byod nominum opendlp nick selby iphone 3gs rsa 2014 adam shostack, chris hoff, david mortman, james atkinson, peter kuper, source boston os x 1st piracy trial cynicism flash micro-payment tcp robert carr external procedures rsnake square programmatic security music piracy ultimately, competition is good. suricata will likely push the snort team to advance their technology faster than in the absence of an alternative. but it's a bit early to load the snort pig onto the content discovery security bloggers network database security platform rogue it password hashing tte getting started in security xp_ oracle world research agenda mailgate career lenr assessment big data wpa emvco dox pin sap mountain lion web security fraud exploits vu rsa guide standard user mode data loss prevention hack new york times project quant ryan naraine robin harris secdevops cloudflare sdn rim nba data security lifecycle database security thomas ptacek preboot authentication forrester toolbox microsoft sql server secure development fud science based security aurora attack syslog data collection outbound network control logical fallacy static analysis tool mobile security data centric security amazon s3 sql server spam haiku disaster recovery remote data wipe 1password ass certification s&l university of california at&t mail marshal keating 5 tillmann werner dep fidelis symantec waf + va api security cloud washing glance ebs sonatype snake oil password manager peter galli project security nosql security barracuda amazon ec2 guardianedge plans security assessment application monitoring incident response policy election amazon rds market forces blackberry hyder blogroll outcomes based security cybersecurity malware alessandro acquisti identity theft emergent chaos mastercard transaction authentication skepticism marketing database encryption digital wallets secure audit logs personal dark reading aslr protegrity vontu inflection scareware network ben tomhave vaultless tokenization api gateways mozilla cyber kill chain clean slate chrome lockheed date breaches credit line fraud core impact aclu filefolder encryption goggles amrit williams sector arcsight fis breach not selling knox adaptive authorization federation exaprotect conti threats cash phi oauth privileged user management monitoring homomorphic encryption security guidelines rackspace database vulnerability sds maverick breaches web application firewalls data encryption evasi0n websense pptp penetration testing secureid pre-boot information governance email security umg hannaford openstack webinar consensus audit guidelines vista security in the cloud clickjacking dan kaminsky webcast security focus vulnerabilities ingenix payment security mccolo messagelabs dam 2.0 ddos ncsc sql injection hsm stealth photograpghy economic downturn mvalent identity and access management public user 8e6 alex hutton owasp 2011 waf+va tokenization sql pci 2.0 pci-dss new zealand scrum digital certificates tde data harvesting web app security java patch data breach triangle email security incite flashblock oval future of security network dlp virtualiron analyst oracle 0-day slip virtual private storage emr sopa database vulnerability assessment clear database amazon web services director of cybersecurity risk assessment security awareness content monitoring and protection ewallet user encryption bbc news stolen data antivirus ciphercloud prices metasploit wireless security gsw hoops mobileme margarita extproc enterprise key manage hearland web application firewall toorcon code analysis software guard extensions digital rights management adobe hypersegregation cpu target breach gazzang iaas nitrosecurity database monitoring tidbits google spying agile failure venture capital 0day data liberation org vpn halloween 0-day exploit mitigation pci european commission s3 center for internet security web hacking july 2009 chris hoff rober information security intrusion deception data protection x.509 design flaws felonspy dbir cloud encryption honeynet project threat level state department security counterculture it audit april 2009 cpu information centric security home security content analysis security rules sidejacking redlining burton application security breach report barracuda networks database activity monitoring application development trend micro 60 minutes dominique levin arduino twitter security adaptive authentication application dos lawsuit forgery fubar database activity monitoring software worker data labels rand security electronic medical records debit card fraud application security inc. file activity monitoring imac volume encryption contingency planning database audit litecoin trustzone img cyberdouchery u.s. sentrigo terror database eff amazon eiq voltage app store sun windows piv ids disclosue watchdox avinti tech target pci is the devil foo verizon breach report appliance vs. software off-balance sheets hype idm hadoop mobile identity application encryption cloud storage stay safe ios 7 rsac 2010 sarbanes-oxley connections ssl vpn stupidity siem replacement social media admin rights risk quantification phil collins pwn2own losers database configuration assessment oracle cpu sony breach hacks direct message visual forensics alt="thing you won't find in my backyard...." open source hardware thomas jefferson nitro security policies lumigent network security proxy encryption cyberwar whitehat security software defined networking simplified sdl anonymized data web 2.0 paranoia meter josh corman mdm incident management secerno block level encryption cmp summary apt slime glenn fleishman totally temporary credit cards cloud security alliance zero day cansecwest perspectives oracle aws dropbox key manager data security cycle breac cyberterror ssdlc sybase audit google active defense china bpo nsa, rsa, cyberdouchery swift flashback owasp q1 fortinet verizon observatory project solidcore systems tizor cvss scoring dlp light logic flaws paas government web filtering missing computers react faster and better cisco transparentexternal encryption parallels alan shimel dysfunction security analytics tsa politics rsa conference fail safari business continuity planning psychology va android virtualization software defined security oracle audit aric robert patterson access-logins bastion phishing application and database monitoring and protection jeremiah grossman esther schindler logrhythm fico score sql azure red herring ncircle deep packet inspection cloud files business auditors passwords first data corporation firesheep data label nsa flash crash bad stock tips weak passwords portal security jimmy buffett shawn moyer couterintelligence mobile device security physical security secure computing mbta pin crackers full disk encryption bitcoin tls paddy anti-exploitation full packet capture black hat kevin rowney tracking software glba check point it world black friday gae emergency medicine visto skybox smart card security guardium vulnerability assessment ed bott tumbleweed software audit betanews youtube cag nessus imperva activity monitoring microsoft security advisories db2 audit change password crashplan dmv siem 2.0 possibility ics economy application 7 myths ie 6 acquisition rese fingerprint roles elastic block storage lifecycle event data virus sexual harassment panda national cybersecurity untitled antitrust sql server trace identity management nisa core security ssl-vpn sox felix leder social security awards object storage column encryption macbook e10+ behavioral monitoring scope reduction secureworks external encryption storage dlp jailbreak predicions session virtualization intel virtual currency metrics data breaches datacenter encryption martin mckeay digital ant swams disruptive innovation secure code development ec2 xss social engineering outsourced security cybercrime atm skeptics guide to the universe defcon java google drive attack amazon simpledb trend online pharmacies apple role based access control define big data exploit cyberattack oracle critical patch industry open source development survey touch id stolen laptop grc anti-spam saas mongohq breach internet explorer location-based privacy static analysis cloudera advanced persistent threat security theater ciso mac csrf database virtualization gunnar peterson pink management by complaint iam mobile device management siem development threatpost fam twitter hack web app assessment marshal8e6 ios instructional gui file encryption sunsec aladdin rbac certificate authority david litchfield kaminsky bug ale whitepape but it brings up a bigger issue of when a technology is _dead_. in reality, there are few examples of products really dying. if you ended up with some consentry gear, then you know the pain of product recency bias virtual desktops mike bailey data security pa-dss chris peterson david mortman data breach costs new school open security foundation eweek sans palo alto networks security industry immutable logs everything’s broken securosis rippletech there are no trusted websites totally transparent research dnscrypt ngs mogull's law sim scansafe volume storage m86 distributed encryption database dos source boston data classification os x 10.8 gatekeeper credit card fraud sybase auditing data protection decisions glass hackers for charity twitter worm bug bounty breach notification tools market size twitter closed syrian electronic army acquire security management nmap security bloggers meetup cloud banking same origin abac vmware secure360 software liability sfo pen test funny if true inference attack binary forensics anton chuvakin microsoft security future heartland payment systems xeround security mindset pgp healthcare workaround organizational destruction rich mogull sprint target ranting roundtable database assessment oracle cpu july 2011 mobile auth ralph gross web application security quantification iphone database breach esi csa security controls csa guidance employee theft aberdeen directory servers mandiant key management porticor proxy object encryption geni disclosure security markets sem mit information sharing dbquant epsilon open source mi6 phone home web browser security computer underground radiant systems hfc informer phoenix oracle database patches statstics immunity canvas hipaa pki getelementsbytagname information lifecycle management andy the it guy stolen safenet tipping point column entrust data breach investigations report evidence based risk management browser security navajo systems mx logic malware response kindle dam hoff flash patch cloud, cloud security, database security, security automation bit9 paper microsoft critical vulnerability vulnerability email encryption incident respons cal idiocy robert "rsnake" hansen rms honeypot purchase blackhat appsec dos transparent research calendar management janet napolitano macalope aviator browser integrigy first steps rights management consensus metrics virtual database patching cloud-init epassport dba verisign standards procedures adword developer tools law safe online shopping hadoop security ipad truecrypt