RSA Europe 2009, London – Day 1
Below are my notes and takeways from the first day of RSA London. The day started off with plenty of cinematics and a nature theme opening session by the heads of RSA. The location is fantastic – the...
View ArticleRSA Europe Conference 2009, Day 3 Recap
I attended the session first thing in the morning on Mal-ware with Michael Thumann of ERNW GmbH. He gave quite a bit of technical detail on how to methodically go through the detection and...
View ArticleSymantec’s 2010 State of Enterprise Security
The 2010 survey is complete and I have dug through and have the following thoughts to offer. First off though – thank you to Symantec for making the information so readily available. They have...
View Article#RSAC Panel on Cloud – security and privacy
Security, Privacy, and liability are top issues for #Cloud security and a popular topic at #RSAC (RSA SFO 2011 Conference) The first session today was moderated by Drue Reeves (Gartner), Michelle...
View ArticleInfrastructure Security Response, Google excludes 11M+ domains
Google officially removed a “freehost” provider from a Korean Company that was providing the .co.cc domain (link to The Register article). This was done on the basis of a large percentage of spammy or...
View ArticleMind the Gap: When third party services are not enough to achieve security or...
MasterCard published a very brief document outlining the very popular Use Case where a Merchant leverages a third party e-commerce system for processing transactions by redirecting to a separate hosted...
View ArticleWhen you play whack-a-mole with File Transfer tools, you chase the mole!...
In the enterprise businesses are seeking to block channels of transferring files, and in many cases the need to manage these is valid and vital to specific business operations. In some cases such...
View ArticleDownload iCloud backups without the device, risk considerations
The ability to save data, sync information, and manipulate information online is extremely convenient and productive. The risks that exist with this activity are fresh and emerging. Unlike the...
View ArticlePasswords are Dead, Part II 2nd False Premise – a collaborative research...
The advent of user created, managed and handled passwords as the sole means of authenticating is coming to an end. The utility of these was defined in an era based on assumptions of brute force...
View ArticleInnovating and penetrating the market – Battlefield Leadership Series –...
Longues Sur Mer At this location on the coast of Normandy you can see the immense naval guns setup to attack oncoming ships in World War II. The Germans expended resources and relied heavily upon on...
View Article
More Pages to Explore .....