Storagecraft2014-2
Headlines for Security
From The Blogs
NSP Microcast – BSides London 2014
Source: Network Security Blog | Posted on 6 April 2014 | 11:40 am
Hack my ride
Source: Network Security Blog | Posted on 6 April 2014 | 3:31 am
Network Security Podcast, Episode 330
Source: Network Security Blog | Posted on 31 March 2014 | 5:09 pm
NSPMicrocast – RSAC2014 – DoSArrest
Source: Network Security Blog | Posted on 23 March 2014 | 4:44 pm
NSP Microcast – RSAC2014 – BeyondTrust
Source: Network Security Blog | Posted on 23 March 2014 | 7:03 am
European InfoSec Blogger Awards
Source: Network Security Blog | Posted on 20 March 2014 | 10:35 am
NSP Microcast – RSAC2014 – Denim Group
Source: Network Security Blog | Posted on 20 March 2014 | 7:10 am
Account Recovery Fail
Source: The New School of Information Security | Posted on 19 March 2014 | 11:59 am
NSP Microcast – RSAC2014 – Utimaco
Source: Network Security Blog | Posted on 18 March 2014 | 4:16 am
NSP Microcast – BSidesSF with Trey Ford
Source: Network Security Blog | Posted on 15 March 2014 | 4:40 am
DLP
Source: Roger's Information Security Blog | Posted on 13 March 2014 | 5:44 pm
Mt. Gox Doxed
Source: Network Security Blog | Posted on 10 March 2014 | 1:53 am
Threat Modeling and Operations
Source: The New School of Information Security | Posted on 21 February 2014 | 10:33 am
My Technical Editor: Chris Wysopal
Source: The New School of Information Security | Posted on 20 February 2014 | 12:46 pm
Testing, Testing Is this thing on
Source: Roger's Information Security Blog | Posted on 29 January 2014 | 5:50 pm
Closed
Source: Roger's Information Security Blog | Posted on 25 August 2013 | 11:00 pm
The Case of the Mixed Content
Source: Roger's Information Security Blog | Posted on 12 August 2013 | 11:39 pm
Be careful little hands what you type
Source: Roger's Information Security Blog | Posted on 1 August 2013 | 2:21 pm
Happy Blogaversary
Source: Roger's Information Security Blog | Posted on 6 May 2013 | 10:42 am
All is quiet on the western front
Source: Roger's Information Security Blog | Posted on 2 May 2013 | 11:33 am
Infosec Introverts
Source: Roger's Information Security Blog | Posted on 19 April 2013 | 7:12 pm
XPiration.
Source: Roger's Information Security Blog | Posted on 15 March 2013 | 2:55 pm
Verizon 2014 DBIR Identifies More Focused, Effective Way to Fight Cyberthreats
Verizon security researchers, using advanced analytical techniques, have found that 92 percent of the 100,000 security incidents analyzed over the past ten years can be traced to nine basic attack patterns that vary from industry to industry.
Heartbleed Security Audit also helps companies comply with Anti-Spam and Privacy legislation

IBM Security, Disaster Recovery as SoftLayer Service
Although business disasters are, of course, bad news, the market for services for recovery and continuity is booming.
McAfee Releases Free Tool to Check for Heartbleed Affected Websites
Quick Access to Information Empowers Consumers to Resume Safe Online Surfing
Resetting All Passwords Now May Be Worst Heartbleed Fix
When it comes to Heartbleed, top global sites should be extra vigilant for an expected rush of fraud-staging activities and social engineering attempts through call centers as fraudsters take advantage of an elevated volume of password resets to fit into the 'noise of the crowd.
Heartbleed bug causes Canada Revenue Agency to shut down online tax filing
The Canadian Revenue Agency expects services to resume by the weekend after the discovery of a bug that could be used to steal personal information.
Apple in talks to buy Japan chip venture to secure iPhone supply chain
Apple Inc, seeking to secure its mobile supply chain, has opened discussions to buy control of a Japanese venture that makes key microchips for its iPhone screens, sources familiar with the matter say.
Identity Theft and Payment Card Fraud Bankroll Other Crimes
Fraud Prevention Remains Top Priority for Police and Financial Services
BlackBerry Advances Security of its Multi-Platform Mobility Portfolio with New Cryptography Certification
FIPS 140-2 validation granted for Secure Work Space for iOS and Android
Michelle Obama in China: internet freedom should be universal right
First lady spoke to students at Peking University during a week-long trip in China aimed at promoting educational exchanges
McAfee Labs Q4 Report Reveals Techniques Used in High-Profile Data Breaches
Underground Market Supports Point-of-Sale Cybercrime from Coding to Monetization; Digitally Signed Malware Triples in 2013 through Content Distribution Networks
China demands explanation from U.S. on Huawei spying report

IBM Launches New Software and Consulting Services to Help Organizations Tackle $3.5 Trillion Lost Annually to Fraud and Financial Crime
IBM introduced new software and services to help organizations use Big Data and Analytics to address the $3.5 trillion lost each year to fraud and financial crimes.
Computer Security Products Inc. releases Protect-UX, a new Access Governance solution for Linux and Unix

Security without data backlogs - CeBIT Highlight

Microsoft takes a stand on student privacy with best-in-class education solutions
Annual Microsoft in Education Global Forum in Barcelona kicks off with strong momentum on Windows 8 and Office 365 with key content partners.
McAfee Labs Q4 Report Reveals Techniques Used in High-Profile Data Breaches
Underground Market Supports Point-of-Sale Cybercrime from Coding to Monetization; Digitally Signed Malware Triples in 2013 through Content Distribution Networks
New Oracle Software Tackles Mobile Security Head On
The Mobile Security Suite from Oracle provides a secure workspace so organizations can separate corporate and personal apps.
Destiny Media Licenses Music Fingerprint and Meta Data from New Pre-Release Songs to Shazam

Boeing Unveils Self-Destructing Government Black Phone
"The Boeing Black phone is manufactured as a sealed device both with epoxy around the casing and with screws," Boeing said in an FCC filing.
Next>>