Login  |  Register  |  Contact
photing friday summary agile 0-day microsoft sql server risk management honeynet project it world siem 2.5 perspectives federation ddos messagelabs s3 kevin rowney stolen paper encryption blogroll brian krebs market forces lifecycle sexual harassment panda dbir 60 minutes scam national cybersecurity transparency proxy hsm password hashing single sign on rsa 2014 trustzone trust id marketing ranting roundtable betanews information sharing data loss prevention dmv election alessandro acquisti rippletech facial recognition career sox vulnerability direct message atm endpoint dlp blackhat connections database encryption stay safe event data syslog cloud files virtual desktops compliance medical security metrics ie closed sprint netflix define big data faith digital ant swams monitoring dat loss prevention asset recovery target breach chris peterson google chrome vector consensus metrics mobile device management external encryption activity monitoring logrhythm source code review social engineering slime nsa email encryption pci 2.0 porticor networkworld mcafee tsa mobile device security phone home scada fde malware macworld app store aurora attack ralph gross asset management oracle cpu database virtualization securecloud ie 7 terror database identity and access management design patterns transparent encryption design flaws behavioral monitoring josh corman aladdin best practices bad stock tips exploit mitigation geni cis2013 anti exploitation vista data labels mike andrews data security patch management 1password breaches sentrigo bit9 aslr help a reader rogue it logical fallacy database audit melissa hathaway ass certification iphone lambda ios breach report debit card fraud mogull's law column encryption web browser security abstraction admp survey counter-strike securosis arduino business justification security rules api gateways csa information security paranoia meter tumbleweed fis breach securid sso infrastructure security risk application and database monitoring and protection hacks automation datacenter sql server trace waf db2 audit asv github purewire imessage appsec stones china greg young network security management truecrypt secure computing sql injection protection sfo prng sunsec personal open source development survey plans cmp appliance vs. software developer tools external procedures flash patch american express snake oil information warfare mobile security management application monitoring economic downturn ooda loop diginotar warrantless wiretap twitter computerized patient records hipaa media encryption admin rights economist column secure web development rsnake not selling bit.ly tokenization guidance extproc virtual appliance hoff owasp 2011 database activity monitoring email parallels 4.0 sgx center for internet security macbook tokenisation specification merchants fortinet malware response robin harris wake forest missing computers data breaches ec2 pink cloud identity emt design noscript api bug bounties auditing verizon training oracle database patches anti-exploitation bryan sullivan dep evasi0n outbound network control mobile auth open source dan kaminsky zdnet emergent chaos cpu access-logins cloud law react faster and better australia ebay hypersegregation industry api gateway ssl instructional healthcare cyberterror threatpost mit hadoop application abac square dcma cloud iam statstics sector wireless security exploit process control systems slip conficker mobileme pwn2own richard bejtlich nosql security rim data encryption government epsilon rsa 2011 lumigent business software alliance doj off-balance sheets ale windows disruptive innovation nitrosecurity object encryption charges online merchants web hacking google prices george holtz anonymouse users rootkits fingerprint sim digital rights management nosql injection employee theft dark reading flash crash sds thomas jefferson database security platform totally nessus pa-dss foo adobe possibility gazzang java vontu compucredit web 2.0 red herring credit card ultimately, competition is good. suricata will likely push the snort team to advance their technology faster than in the absence of an alternative. but it's a bit early to load the snort pig onto the ciso ncircle twitter hack shawn moyer programmatic security dox sem getting started in security rapid7 dhs sun hardware security module porn content analysis vivendi los alamos cpr admin ewallet mobile identity database activity monitoring software toilet seat software defined networking intrusion deception sopra group response acquire quantification zbot passwords goggles ev9 pin crackers piv oracle critical patch axway new zealand pci dss esther schindler internet redesign storage oracle cpu july 2011 auditors cloudflare maverick agile program management alt="thing you won't find in my backyard...." software defined network mobile app security dnssec 8e6 nick selby ncsc ssl-vpn computer underground byod exploited pdf core impact scareware session virtualization oracle 0-day cynicism esi martin mckeay tech target peter kuper nitro gui smart card security sega xeround safari gce getelementsbytagname os x data protection security awareness epassport social security awards marshal8e6 rsa guide ioug clickjacking gartner ssdlc couterintelligence assume waf + va ccsk botnets cloudera lancope user encryption volume encryption phishing ruby antivirus music piracy table encryption secureid patent troll bbc news fired wired mail marshal glba software audit tipping point webcast mongohq breach secure enclave kaminsky bug april 2009 cpu security market lenr online pharmacies preboot authentication data collection losers fud hadoop security volume storage watchdox data security survey organizational destruction ecc hspace="10" vspace="10" dvd source boston 2009 anti-spam saas e10+ gatekeeper alex hutton palisade chip and pin iaas open source hardware twitter security evm beyondtrust database dos linkedin assessment api management security analytics android flash 0day ics digital evidence security counterculture data breach investigations report intel visto security controls database security future of security application security inc. threat level anti-piracy injection proxy encryption openstack webinar security training cloud data lifecycle washington post upgrade dlp light economics provisioning passport data csa guidance virtual database patching visa transparent funny if true security guidelines aws visual forensics network security static analysis tool oracle audit analyst agile development disclosue new york web filtering database monitoring chrome medicare procedures sybase audit privacy mobile payment security adaptive authentication metasploit entrust secdevops firefox devops data breach costs sql server sap solidcore systems electronic medical records civil rights lazy mountain lion breach observatory project bill brenner message security data liberation org chris hoff phil collins development elastic block storage stolen laptop fcc fico score security theater safenet black friday research agenda adobe flash peter galli home comupting roles physical security edrm threats management by complaint nisa european commission cyberdouchery lawsuit umg saas security investment fidelis dnscrypt owasp dam appliance database scan robert patterson david mortman nosql flashback app security dsp content monitoring and protection amazon ec2 iphone 3gs rackspace whitepaper humor xss risk assessment amazon s3 spam governance alan shimel incident management anti-malware static analysis new school verizon breach report security assessment gae scrum radiant systems mac secerno workaround buss count vaultless tokenization security policies sarbanes-oxley jbig2decode techtarget cisco waf+va pin annualized loss expectancy felonspy slammer 3d printing vpn swift u.s. dynamic analysis certificate authority rand forgery antisqli software defined security project quant vmware halloween first steps amrit williams cnet risk metrics key manager logic flaws secure sdlc dominique levin security breach ed bott fraud security innovation secureworks adword tcp xp_ hfc informer postini security markets antitrust jimmy buffett walmart data breach open source survey bug bounty identity theft attack forensics untitled fpe full packet capture q1 cyberskeptic qualys appletv virtual currency x.509 code analysis dbquant enterprise drm jeff jones flashblock spam haiku ingenix secure audit logs google dashboard cvss scoring symantec ngs datacard source boston rod beckstrom venture capital sice neighbors object storage microsoft sdl sql injection at&t clear text passwords trustwave sopa paypal m86 rich mogull inference attack twitter worm management dlp star trek jesse krembs vormetric data classification trend transparentexternal encryption how bitcoin works recency bias rsa conference database digital certificates block level encryption loglogic ebs event driven security opendlp convergence research calendar rbac blast radius database vulnerability toolbox palo alto yahoo immunity canvas nominum ben tomhave networking storage dlp websense amazon aws incident response virus honeypot keating 5 thomas ptacek coyotes binary forensics virtualization consensus audit guidelines tidbits insurance double standards data valuation andrew jaquith security bloggers meetup glass rock trend micro simplified sdl zerodium security emr secure360 aviator browser credit card fraud vulnerability assessment business continuity planning risk quantification data breach triangle imac amazon tripwire third test lockheed safe online shopping deep packet inspection style="border: 0px solid ; float: right;" hearland robert "rsnake" hansen sans worker rese application encryption full disk encryption online medical records andy the it guy trust va schneier ibm fiserv integrigy redlining first data corporation parallels cloud-init img microsoft security advisories stolen data science based security glance media protection tenable dns sales gsw hoops segregation playstation network breach burton open security foundation imperva sidejacking voltage disaster recovery protegrity totally transparent research vdi db2 event monitor nmap hack sdlc data mining everything’s broken browser security orchestration big data security predicions database assessment palo alto networks dos wpa ids felix leder software liability data security cycle payment security internet explorer crisis communications penetration testing avdl aza skepticism heartland tools key management rms apple date breaches filefolder encryption debix data security lifecycle user security policy rsac 2010 micro-payment cloud encryption sony breach xml security margarita cloud security disclosure cognitive science economy mastercard verisign critical patch pci is the devil eff retrospective mvalent file activity monitoring breach notification berkeley security focus data harvesting oauth ipad identity management network forensics hackers for charity morro stealth photograpghy randall stross paas mdm password manager emv cyberwar idiocy barracuda networks trustworthy computing incident respons data mailgate qa david litchfield tokenization throttling security in the cloud immunity blackberry eiq credit line fraud feltbot skeptics guide to the universe web application firewalls it audit pragmatic data security radio field encryption database breach bitcoin security engineering ssn file encryption tizor os x 10.8 gatekeeper phoenix pdf transaction authentication tutorial inflection tls acquisition quick wins mx logic mozilla cloud compliance home equity fraud probability oval nsa, rsa, cyberdouchery clear database macalope enterprise key manage janet napolitano internal threat pragmatic cso cash pii tjx anti-spam active defense security future sql azure consumer drm dba syrian electronic army 7 myths grc safe browsing information-centric business politics policies splunk evidence based risk management database configuration assessment hannaford web application firewall cloud computing bpo agile failure dean security mindset corporate virtual private storage mike bailey google drive cybersecurity juniper dr. lawren smithline psychology mel torme content discovery network dlp eweek standards bastion operationalization of security home security security research robert carr purchase jailbreak mccolo whitehat security microsoft virtualiron market size mbta social media database vulnerability assessment siem 2.0 target azure music finjan standard user mode friday fam nuclear weapons targeted destructive fail s3cmd zero day litecoin java patch chef