Login  |  Register  |  Contact
certificate authority volume encryption mcafee youtube bit9 appletv home security rich mogull shawn moyer hsm big data security new zealand brian krebs nisa policy rock trustworthy computing radio data breach costs ass certification juniper warrantless wiretap hp iphone 3gs double standards security incite glass hack neighbors heartland payment systems data liberation org venture capital spam network cyber kill chain business justification for data security browser security rootkits compliance strategy cnet renegotiation attack breac keating 5 psychology proofpoint predicions log management security analytics mx logic database vulnerability assessment amazon ec2 sdlc project security scam security industry anton chuvakin netflix ietf eiq acquire compucredit virus anonymouse users guardianedge square datacenter risk management isolation security markets andrew jaquith debit card fraud amazon web services friday summary social security numbers av stolen data bpo fiserv dos sfo segregation qualys admin rights hearland third test patch tuesday database encryption cyberattack web security mailgate purewire xss google preboot authentication scareware phi agile program management 8e6 stolen malware response hipaa policies stolen laptop couterintelligence business justification clear database vormetric openstack beyondtrust data masking upgrade possibility black friday cloud iam merchants information warfare mike rothman dynamic analysis admin antitrust martin mckeay secureworks cash esther schindler perspectives proxy electronic medical records deep packet inspection macalope ioug pragmatic data security internet redesign secureid civil rights forensics mail marshal pin crackers medicare pwn2own rippletech honeynet project mongohq breach anonymized data 60 minutes malware digital rights management dox disclosue infrastructure security transparentexternal encryption oracle database patches dark reading enterprise drm hacks patch management 451 forrester database networking faith admp cal tsa computerized patient records microsoft sdl agile failure sox os x 10.8 gatekeeper credit card data loss prevention microsoft database configuration assessment trend gae ponemon secerno anti-malware data label data centric security virtual private storage verizon breach report data harvesting sem database activity monitoring targeted destructive transparent encryption botnets core impact fis breach virtual appliance evm amrit williams secure computing mi5 networks security mindset xp_ rights management sim define big data national information security association tls cvss scoring truecrypt ed bott critical patch recency bias blast radius market size computer underground sopa zdnet scansafe phoenix rsa 2011 proxy encryption web browser security mobile device security amazon simpledb rober management by complaint robert "rsnake" hansen stealth photograpghy josh corman stay safe app store ncsc safe browsing ccsk convergence trust id binary forensics bug bounty goggles quick wins appsec toolbox network dlp medical palo alto networks palo alto disclosure rand assume information sharing open security foundation secure360 penetration testing gce security research not selling skeptics guide to the universe george holtz touch id paddy pci is the devil alessandro acquisti paypal mobile owasp rms anti-disambiguation appliance vs. software macbook websense vulnerabilities berkeley directory servers cloudflare stones clear text passwords provisioning diginotar cag github dbquant sonatype data labels open source development survey adaptive authentication cloud compliance messaging 0-day voltage same origin china robert carr nmap asv static analysis tool espionage core security oracle audit david mortman standard user mode law msrc api management network forensics purchase fail microsoft critical vulnerability network security application and database monitoring and protection corporate software defined security privileged user management personal slammer sybase research data security cycle google spying stupidity software guard extensions event data standards agile development photing axway chrome ruby loglogic paas transaction authentication mccolo antisqli hadoop pragmatic cso but it brings up a bigger issue of when a technology is _dead_. in reality, there are few examples of products really dying. if you ended up with some consentry gear, then you know the pain of product oracle innovation playstation network breach dropbox debix visto everything’s broken edrm idm nosql security margarita tipping point access-logins economic downturn immunity burton evasi0n application development tumbleweed visa cloud computing emergency medicine project quant storage ics hypersegregation safenet dvd intrusion deception rsac 2010 getting started in security hyder plans emvco fbi twitter worm software liability center for internet security sun national cybersecurity ecc abstraction operationalization of security observatory project tenable alex hutton application email counter-strike wired information centric security dnssec incident management amazon rds pci totally transparent research coyotes new york times dan kaminsky apple cybersecurity online pharmacies ddos lenr auditing doj vulnerability web app assessment 2014 open source survey programmatic security api gateways rant joshua corman geni tokenization throttling chef secure development requestpolicy database virtualization ralph gross security investment los alamos twitter internal threat pci 2.0 adaptive authorization os x mobile identity trend micro app security worker email security oval scada emv saas encryption trust april 2009 cpu iphone mike bailey entrust 7 myths bbc news emt nosql injection aza sds iaas governance cloud, cloud security, database security, security automation csa guidance missing computers sans banking gunnar peterson first steps security market exploits micro payment behavioral monitoring barracuda networks instructional social media ncircle virtualization home comupting pci-dss bug bounties full disk encryption location-based privacy breach notification database vulnerability qa rod beckstrom filefolder encryption web hacking data breach google chrome ranting roundtable fortinet heartland red database security redlining sql database dos data mining randall stross imperva mastercard melissa hathaway zbot cmp european commission federation elastic block storage vontu mobile auth xeround owasp 2011 visual forensics low hanging fruit pink lumigent best practice information governance star trek external procedures flashblock buss count data protection format preserving encryption metrics endpoint dlp application encryption java parallels organizational destruction market forces securosis event driven security object storage morro clickjacking secure code development chris peterson tde ec2 security breach csrf healthcare waf scope reduction information lifecycle management security bloggers meetup devops cio field encryption data loss security awareness macworld whitepape vpn music web application firewalls ids hannaford tte solidcore systems cloudera betanews s3cmd siem 2.5 vivendi ooda loop sector rim robert patterson secdevops ingenix parallels 4.0 tcp source code review government linkedin oracle cpu july 2011 epassport dam defcon zero day thomas ptacek watchdox research agenda android contingency planning mobile device management exaprotect cansecwest direct message sunsec adobe idiocy database activity monitoring software encryption dhs firefox securid gui virtualiron trustwave file activity monitoring immutable logs waf + va software defined networking bitcoin credit card fraud file encryption facebook dcma jimmy buffett state department online medical records data breach triangle postini nitrosecurity auditors physical security q1 web filtering alt="thing you won't find in my backyard...." source boston 2009 survey sopra group business password manager snake oil csa pen test mobileme single sign on firesheep adobe flash mobile procedures retrospective ipad privacy network security management alan shimel piv integrigy ssl paper flash patch oracle critical patch litecoin help a reader vdi imessage crisis communications webcast navajo systems api object encryption passwords schneier pptp tokenization byod tools ciphercloud security in the cloud cynicism fraud date breaches rbac ciso breach sice netezza dsp ediscovery security guidelines bad stock tips terror database password hashing jailbreak credit line fraud mvalent enterprise key manage avinti eff automation dam appliance breaches volume storage security rules change password anti-spam saas pgp bastion twitter hack oauth session virtualization cloud files inference attack new york mbta jbig2decode database scan disruptive innovation content analysis red herring cisco ie 7 static analysis e10+ guardium 1st piracy trial opendlp gatekeeper off-balance sheets data security survey developer tools knox cognitive science security controls information-centric microsoft sql server research calendar user security cloud encryption vulnerability assessment enterprise key management tutorial halloween thomas jefferson training tokenisation specification sarbanes-oxley sql injection protection economy syrian electronic army whitepaper block level encryption chip and pin atm dam 2.0 extproc bit.ly richard bejtlich logical fallacy cloud storage saas outbound network control vector kaminsky bug american express cloud security friday marshal8e6 security policies tracking software risk assessment tripwire fpe election andy the it guy exploit wired magazine denial of service siem vaultless tokenization fired roles humor application security inc. probability economics lazy consumerization of it injection risk activity monitoring sql server data connections conti palisade sybase audit ssdlc spam haiku workaround passport data zerodium scrum table encryption pa-dss tjx trinity active defense nitro honeypot messaging security security metrics felix leder kevin rowney s3 temporary credit cards social engineering nominum software audit cyberwar ben tomhave outcomes based security rsa how bitcoin works aladdin external encryption dat loss prevention safari u.s. statstics incident response ie 6 foo response gazzang logrhythm phishing anti-spam aws windows noscript fde flashback web application security lambda rsa 2014 user encryption ssn pki protegrity greg young design flaws eweek webinar media encryption new school mdm vmware dlp consensus metrics cloud security alliance blogroll arizona nessus security management lancope epsilon amazon mel torme verizon symantec secure audit logs avdl mac porticor full packet capture university of california digital certificates there are no trusted websites fingerprint application monitoring open source pci dss funny if true security engineering va content monitoring and protection db-dos azure application dos dmv transparent threats tech target peter kuper design washington post porn virtual desktops maverick immunity canvas science based security simplified sdl disaster recovery emergent chaos dominique levin losers mobile security sgx security training db2 event monitor web application firewall messagelabs dep ibm metasploit tidbits sexual harassment panda slime style="border: 0px solid ; float: right;" anti exploitation online merchants black hat it audit 1password dbir sony breach database breach data security oracle 0-day clean slate swift ssl vpn felonspy mogull's law dr. lawren smithline hadoop security amazon aws neil macdonald esi data breaches pii fico score crashplan bitlocker social security awards java patch database audit consumer drm micro-payment politics iam smart card security security focus transparency mike andrews anti-exploitation business continuity planning virtual currency security data protection decisions incident respons glenn fleishman ios message security cyberskeptic evidence based risk management logic flaws assessment cloud identity data breach investigations report sap social networking dean ewallet column encryption breach report asset recovery rsa guide ev9 toorcon nsa, rsa, cyberdouchery dns fcc dnscrypt s&l database monitoring waf+va yahoo 3d printing imac nick selby content discovery barracuda full drive encryption security future acquisition weak passwords splunk xml security web 2.0 aslr radiant systems virtual database patching skybox api gateway dlp light hoff abac advanced persistent threat untitled internet explorer twitter security security innovation tizor secure enclave cis2013 director of cybersecurity phil collins lawsuit identity theft aurora attack open source survey exploit mitigation compliance role based access control ngs cpu portal security lockheed ebs siem 2.0 nosql exploited pdf email encryption glance sql azure 0day x.509