Latest Blog Posts
June 20, 2013 Added by:Eric Chiu
In a competitive business environment, reputation is a critical differentiator. Any company that suffers from a major data breach, instigated by an employee with a small grudge and big access, could face devastating consequences to the corporate brand, and to the bottom line.
June 19, 2013 Added by:Simon Moffatt
RESTful architectures have been the general buzz of websites for the last few years. The simplicity, scalability and statelessness of this approach to client-server communications has been adopted by many of the top social sites such as Twitter and Facebook. Why? Well, in their specific cases, developer adoption is a huge priority.
June 18, 2013 Added by:Anthony M. Freed
While the widespread rage over the government engaging in the systematic collection and analysis of data about law abiding citizens is more than understandable, the fact is that people in this age of the Internet freely share huge amounts of personal information on a daily basis, and doing so puts them at risk.
June 18, 2013 Added by:Tripwire Inc
This post is all about Control 13 of the CSIS 20 Critical Security Controls – Boundary Defense. Here we explore the (29) requirements I’ve parsed out of the control.
June 17, 2013 Added by:Rafal Los
Security Intelligence. This topic seems to come up over and over in discussions with enterprise security leaders, security professionals, writers, and pundits. There are many different facets to the topic, but ultimately what are we talking about?
June 17, 2013 Added by:DHANANJAY ROKDE
A generic definition of a crime would be an act that is in violation of the applicable laws.
June 14, 2013 Added by:Vinod Mohan
Given the expanding threat landscape for the SMB and the increased demand for affordable IT security tools, here are five valuable tips for IT pros that help shed light on managing enterprise security on a budget.
June 13, 2013 Added by:Jarno Limnéll
Privacy and Security: Both are mandatory – and necessary. Privacy is inherent in our contemporary understanding of democracy, whereas security requires intelligence. The challenge lies in being able to find the right balance while avoiding excesses.
The NSA’s Word Games Explained: How the Government Deceived Congress in the Debate over Surveillance Powers
June 12, 2013 Added by:Electronic Frontier Foundation
Concerned about the surveillance of millions of ordinary Americans, last year Senator Ron Wyden asked Director of National Intelligence James Clapper, Jr. a simple question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?"
June 12, 2013 Added by:InfosecIsland News
Supposed "bombshell revelations" about NSA surveillance programs are, at this point, much ado about nothing, says a professor at Texas A&M University who contends that the government's monitoring of phone and Internet communications has been going on for years, is completely legal and is not targeting the average U.S. citizen.
June 12, 2013 Added by:Rafal Los
If adding security to your enterprise software development methodology and lifecycle creates a significant amount of drag on the actual release deadlines —for an extended period of time — you’re doing it wrong.
June 12, 2013 Added by:Anthony M. Freed
Security BSides Las Vegas will be held on July 31st & August 1st, and so we continue our series highlighting some of the many interesting sessions that are scheduled for the conference.
June 12, 2013 Added by:Ian Tibble
The notion that VA tools really can be used to give a decent picture of vulnerability is still heavily embedded, and that notion in itself presents a serious vulnerability for businesses.