[soundcloud url=”http://api.soundcloud.com/tracks/57366510″ iframe=”true” /]
Vulnerability management is a key component of a strong information security program. And that’s making sure that with everything you’re doing – in the cloud, on the desktop, browsers and server environments – you can reduce the vulnerabilities so that no matter what threats are out there, they are less likely to be successful.
A new website known as WeKnowYourHouse.com combinations tweets by users who write about being home and sifts through those posts to find ones that also include the users’ location data. Having those two pieces of information, which are publicly available, the site also incorporates Google Streetview to post an image of the person’s home. […]
Online TakeDownCon Live August 15 and afterward on demand Highlighted Presentations: Bring Your Own Destruction Aamir Lakhani, Senior Solutions Technical Global Architect, World Wide Technology August 21, 2012 9:00 am PT, 12:00 pm ET BYOD is […]
With the introduction of a newly drafted legislation by Representative Edward Markey, he is looking for a way to curb the growing number of requests wireless carriers receive from U.S. law enforcement agencies for their customers’ phone records. […]
Microsoft has released a large collection of Free Microsoft eBooks for you, including: SharePoint, Visual Studio, Windows Phone, Windows 8, Office 365, Office 2010, SQL Server 2012, Azure, and more. […]
This year, the Washington D.C. Tech-Security Conference will bring together private industry, government decision makers and technical enthusiasts in the fields of Information & Network Security. This unique conference format will provide several interactive high intensity sessions as well as tremendous networking opportunities. […]
EC-Council University (ECCU) is offering a full scholarship for its Master of Security Science (MSS) Program. The MSS prepares students for leadership positions in the cyber security industry. A 36-hour program, the course work can be completed online in as little as two years. Specifically the program offers in-depth instruction in the areas of ethical hacking, network security, digital forensics, disaster recovery, organizational structure and behavior, leadership and communication. […]