Using ambient sound as a two-factor authentication system

Using ambient sound as a two-factor authentication system

A posting from naked security titled  ” Using ambient sound as a two-factor authentication system” by Lee Munson We know that many of us are no good
Aug 17, 2015 | 0 comments | View Post
Black Hat USA 2015 Wraps Up Record-Breaking Week in Las Vegas

Black Hat USA 2015 Wraps Up Record-Breaking Week in Las Vegas

Black Hat USA 2015 Wraps Up Record-Breaking Week in Las Vegas
Aug 10, 2015 | 0 comments | View Post
Enterprise Log Management: An Overview (Part 1)

Enterprise Log Management: An Overview (Part 1)

Enterprise Log Management: An Overview (Part 1)
Jul 02, 2015 | 0 comments | View Post
THE IMPACT OF FEDERAL REGULATIONS ON THE INFORMATION ASSURANCE OF THE NORTH AMERICAN ELECTRICAL ENERGY GRID Part 2 of 2

THE IMPACT OF FEDERAL REGULATIONS ON THE INFORMATION ASSURANCE OF THE NORTH AMERICAN ELECTRICAL ENERGY GRID Part 2 of 2

Part II THE IMPACT OF FEDERAL REGULATIONS ON THE INFORMATION ASSURANCE OF THE NORTH AMERICAN ELECTRICAL ENERGY GRID
May 20, 2015 | 0 comments | View Post
InfoSec Jobs - Security Operations Specialist

InfoSec Jobs – Security Operations Specialist

InfoSec Jobs – Security Operations Specialist

InfoSec Jobs - Vulnerability Management Consultant

InfoSec Jobs – Vulnerability Management Consultant

InfoSec Jobs – Vulnerability Management Consultant

IT, Cybersecurity Salaries on the Rise

IT, Cybersecurity Salaries on the Rise

IT, Cybersecurity Salaries on the Rise

BlackHat 2015 USA Pictures

BlackHat 2015 USA Pictures

BlackHat 2015 USA Pictures

The Heartbleed Bug

The Heartbleed Bug

The Heartbleed Bug

National Cyber Security Awareness Month Kicks Off

National Cyber Security Awareness Month Kicks Off

National Cyber Security Awareness Month Kicks Off

Obama, Xi vow cooperation on cybersecurity

Obama, Xi vow cooperation on cybersecurity

Obama, Xi vow cooperation on cybersecurity

DerbyCon 2015 Keynote/Track 2 Live Stream

DerbyCon 2015 Keynote/Track 2 Live Stream

Cyberattack 101: Why Hackers Are Going After Universities

Cyberattack 101: Why Hackers Are Going After Universities

Cyberattack 101: Why Hackers Are Going After Universities

Glossary of Computer and Security Terms

Glossary of Computer and Security Terms

Glossary of Security Terms

Creating a username and password to access OpenVAS

Creating a username and password to access OpenVAS

How to create a username and password to access OpenVAS

CSI Cyber Recap

CSI: Cyber Season 1 Episode 2 Recap: CMND:CRASH

CSI: Cyber Season 1 Episode 2 Recap: CMND:CRASH

My Security Thoughts – A Panel Discussion

My Security Thoughts – A Panel Discussion

My Security Thoughts – A Panel Discussion

Cheating website subscribers included WH, Congress workers

Cheating website subscribers included WH, Congress workers

Cheating website subscribers included WH, Congress workers

Hackers Dump Ashley Madison User Database... Where Most People Won't Find It

Hackers Dump Ashley Madison User Database… Where Most People Won’t Find It

Hackers Dump Ashley Madison User Database… Where Most People Won’t Find It

Why AT&T's 'Willingness' To Help NSA Is Alarming

Why AT&T’s ‘Willingness’ To Help NSA Is Alarming

A posting from Dark reading  titled ” Why AT&T’s ‘Willingness’ To Help NSA Is Alarming” by Eric Zeman The NSA would have had a much more difficult time spying on Americans were it not for the comfortable, chummy partnership the government forged with AT&T, say new documents released by Edward Snowden. AT&T worked closely with the government […]

Richard Bejtlich Talks Business Security Strategy, US Security Policy

Richard Bejtlich Talks Business Security Strategy, US Security Policy

A video posting form Dark reading titled “Richard Bejtlich Talks Business Security Strategy, US Security Policy”  by Richard Bejtlich Chief security strategist of FireEye talks at the Dark Reading News Desk at Black Hat about what should really be driving your security department’s strategy. Plus he discusses law enforcement agencies’ efforts to put backdoors in […]

My Security Thoughts: Anonymity and Privacy, There is None Nor Should We Expect It

My Security Thoughts: Anonymity and Privacy, There is None Nor Should We Expect It

My Security Thoughts: Anonymity and Privacy, There is None Nor Should We Expect It

NICE (National Initiative for Cybersecurity Education) Conference 2015

NICE (National Initiative for Cybersecurity Education) Conference 2015

NICE (National Initiative for Cybersecurity Education) Conference 2015

SecurityBSides DC 1st Round Ticket Sales Open Now

SecurityBSides DC 1st Round Ticket Sales Open Now

SecurityBSides DC 1st Round Ticket Sales Open

NSA sets date for purge of surveillance phone records

NSA sets date for purge of surveillance phone records

A posting from NakedSecurity titled “NSA sets date for purge of surveillance phone records ” by  Lisa Vaas  The National Security Agency (NSA) has set a date to purge phone records collected during its bulk surveillance program. “Analytic access” to the five years worth of records will end on 29 November, and they’ll be destroyed […]

Code Theft: Protecting IP At The Source

Code Theft: Protecting IP At The Source

An interesting article from DarkReading titled “Code Theft: Protecting IP At The Source” by Anna Chiang.   Your corporate assets are at risk and every day that you avoid taking action shortens the time until your IP will be leaked. Here are six steps toward better data security. The security world is awash with various malware-centric cyber […]

Online Security: How The Experts Keep Safe

Online Security: How The Experts Keep Safe

An interning article titled “Online Security: How The Experts Keep Safe” from information week by Thomas Claburn. In the 1976 thriller Marathon Man, Nazi war criminal Dr. Christian Szell tortures runner “Babe” Levy to find out whether it’s safe for him to retrieve diamonds stored in a bank deposit box. “Is it safe?” Szell asks repeatedly. Levy, […]

Page 1 of 3612345...102030...Last »
error: Content is protected !!