giovedì 26 settembre 2013

Incident & Data Breach Response: Network Breach Investigation

Incident & Data Breach Response: Network Breach Investigation

The World's leading Antivirus Experts meet next Week

Virus Bulletin - the world's leading anti-virus experts meet next week

Why Do We Tolerate Bad Wireless? | The Networking Nerd

Why Do We Tolerate Bad Wireless? | The Networking Nerd

Cloud Security Alliance Releases Cloud Controls Matrix, Version 3.0

Cloud Security Alliance Releases Cloud Controls Matrix, Version 3.0 - Yahoo Finance

Deploy endpoint encryption technologies with Wave Cloud 2014

Deploy endpoint encryption technologies with Wave Cloud 2014

Big data analytics for security intelligence

Big data analytics for security intelligence

mercoledì 25 settembre 2013

Researchers Build a Working Carbon Nanotube Computer - NYTimes.com

Researchers Build a Working Carbon Nanotube Computer - NYTimes.com

NASA's New FINDER Scans for Breathing Bodies in Disaster Rubble | Motherboard

NASA's New FINDER Scans for Breathing Bodies in Disaster Rubble | Motherboard

Fixing CSRF vulnerability in PHP Applications

Fixing CSRF vulnerability in PHP Applications

Protecting Wireless Networks Tips | Internet Safety | Kaspersky Lab

Protecting Wireless Networks Tips | Internet Safety | Kaspersky Lab

Plugging network leaks - Network World

Plugging network leaks - Network World

KVASIR-Cisco Releases Open Source Tool for Pen Testers | SecurityWeek.Com

Cisco Releases Open Source Tool for Pen Testers | SecurityWeek.Com

Disaster Recovery as a Service (DRaaS) Can Help SMBs

Disaster Recovery as a Service (DRaaS) Can Help SMBs

What the heck is going on with NIST’s cryptographic standard, SHA-3? | Center for Democracy & Technology

What the heck is going on with NIST’s cryptographic standard, SHA-3? | Center for Democracy & Technology

What the heck is going on with NIST’s cryptographic standard, SHA-3? | Center for Democracy & Technology

What the heck is going on with NIST’s cryptographic standard, SHA-3? | Center for Democracy & Technology

Configuring IronPort to use TLS|1000481 - Cisco Support Community

Configuring IronPort to use TLS|1000481 - Cisco Support Community

martedì 24 settembre 2013

U.S. Army Special Operations Command Units Ceasing Use of Mefloquine | Public Intelligence

U.S. Army Special Operations Command Units Ceasing Use of Mefloquine | Public Intelligence

ISSUU - Operational Levels of Cyber Intelligence by Intelligence and National Security Alliance

ISSUU - Operational Levels of Cyber Intelligence by Intelligence and National Security Alliance

How to Analyze Social Media Traffic in Google Analytics

How to Analyze Social Media Traffic in Google Analytics

Security: Book Review -- The Practice of Network Security Monitoring, Richard Bejtlich, no starch press, July 2013 | ITworld

The Practice of Network Security Monitoring, Richard Bejtlich, no starch press, July 2013 | ITworld

Geopolitical Journey: The U.S.-European Relationship, Then and Now | Stratfor

Geopolitical Journey: The U.S.-European Relationship, Then and Now | Stratfor

Cybersecurity | Homeland Security News Wire

Evaluating the IT security posture of business partner

6 Social Media Management Tools Ready for the Enterprise - CIO.com

6 Social Media Management Tools Ready for the Enterprise - CIO.com

WebView addJavascriptInterface Remote Code Execution - mwrlabs

WebView addJavascriptInterface Remote Code Execution - mwrlabs

lunedì 23 settembre 2013

How a marketer can impress the CEO and CFO - exploreB2B

How a marketer can impress the CEO and CFO - exploreB2B

Elements to consider when designing a corporate website - by Eileen Eva - Helium

Elements to consider when designing a corporate website - by Eileen Eva - Helium

Keeping Communication Secure in New Era - BankInfoSecurity

Keeping Communication Secure in New Era - BankInfoSecurity

The Need for Network Security in the Face of Android Vulnerabilities

The Need for Network Security in the Face of Android Vulnerabilities

Tips on Managing Incident Investigations - GovInfoSecurity

Tips on Managing Incident Investigations - GovInfoSecurity

PI: LinkedIn, rastrellamenti a scopo spam?

PI: LinkedIn, rastrellamenti a scopo spam?

Big data investments continue to rise

Big data investments continue to rise

Oracle and Freescale push Java for the internet of things — Tech News and Analysis

Oracle and Freescale push Java for the internet of things — Tech News and Analysis

Data Exfiltration in Targeted Attacks | Security Intelligence Blog | Trend Micro

Data Exfiltration in Targeted Attacks | Security Intelligence Blog | Trend Micro