
blog.securitybalance.com
Security BalanceSecurity geek who writes about whatever comes to his mind: almost nothing :-)
http://blog.securitybalance.com/
Security geek who writes about whatever comes to his mind: almost nothing :-)
http://blog.securitybalance.com/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Monday
LOAD TIME
6.1 seconds
PAGES IN
THIS WEBSITE
19
SSL
EXTERNAL LINKS
1
SITE IP
172.217.6.83
LOAD TIME
6.14 sec
SCORE
6.2
Security Balance | blog.securitybalance.com Reviews
https://blog.securitybalance.com
Security geek who writes about whatever comes to his mind: almost nothing :-)
Security Balance: Slides from my RSA Conference session
http://blog.securitybalance.com/2015/04/slides-from-my-rsa-conference-session.html
Security geek who writes about whatever comes to his mind: almost nothing :-). Monday, April 27, 2015. Slides from my RSA Conference session. My slides from the "Art of Thinking Security Clearly" session at RSA are now available for download. You can find them here. Augusto Paes de Barros. Subscribe to: Post Comments (Atom). 2015 RSA Conference impressions. Slides from my RSA Conference session. Simple template. Powered by Blogger.
Security Balance: April 2015
http://blog.securitybalance.com/2015_04_01_archive.html
Security geek who writes about whatever comes to his mind: almost nothing :-). Thursday, April 30, 2015. 2015 RSA Conference impressions. After a few days settling back to day to day routine and recovering from past week, I believe I can finally put together some thoughts about what I saw at RSA this year. First, I'm happy with the results from my talk, "The Art of Thinking Security Clearly. Now, on the other stuff, I believe the key points I noticed were:. Augusto Paes de Barros. Links to this post.
Security Balance: Papers and presentations
http://blog.securitybalance.com/p/papers-and-presentations.html
Security geek who writes about whatever comes to his mind: almost nothing :-). Some of my papers, publications, presentations and other remarks:. Trilhas em Segurança da Informação: caminhos e ideias para a proteção de dados (Book). Authored chapter on Risk Management - January, 2015. ISSA Journal – Security Blind Spots – April, 2008. Security Review Magazine – Fechando as Torneiras (“Closing the taps”, Article about data leaks) – August, 2005. BSides Toronto 2014 - Security and Behavioral Economics.
Security Balance: 2015 RSA Conference impressions
http://blog.securitybalance.com/2015/04/2015-rsa-conference-impressions.html
Security geek who writes about whatever comes to his mind: almost nothing :-). Thursday, April 30, 2015. 2015 RSA Conference impressions. After a few days settling back to day to day routine and recovering from past week, I believe I can finally put together some thoughts about what I saw at RSA this year. First, I'm happy with the results from my talk, "The Art of Thinking Security Clearly. Now, on the other stuff, I believe the key points I noticed were:. Augusto Paes de Barros. Simple template. Po...
Security Balance: December 2013
http://blog.securitybalance.com/2013_12_01_archive.html
Security geek who writes about whatever comes to his mind: almost nothing :-). Tuesday, December 31, 2013. Were completely and totally owned. Reading this whole thing about NSA capabilities. Just make us realize the simple truth: we are completely owned. Augusto Paes de Barros. Links to this post. Subscribe to: Posts (Atom). Were completely and totally owned. Simple template. Powered by Blogger.
TOTAL PAGES IN THIS WEBSITE
19
security-need.com - This website is for sale! - security-need Resources and Information.
The domain security-need.com. May be for sale by its owner! This page provided to the domain owner free. By Sedo's Domain Parking. Disclaimer: Domain owner and Sedo maintain no relationship with third party advertisers. Reference to any specific service or trade mark is not controlled by Sedo or domain owner and does not constitute or imply its association, endorsement or recommendation.
Sharing of Knowledge with Security Professionals | www.security-warehouse.com
Sharing of Knowledge with Security Professionals. DS1971 iButton 256-Bit EEPROM – Maxim. 256-bit Electrically Erasable Programmable Read Only Memory (EEPROM) communicates with the economy of one signal plus ground. EEPROM organized as one 256-bit page. 64-bit one-time programmable application register is automatically write-protected after programming. Reduces control, address, data, power, and programming signals to a single data pin. DS1971 iButton 256-Bit EEPROM – Maxim. June 4, 2015. June 1, 2015.
Security Active Blog
The findings and mutterings of a security professional. Hibernation …. Well Kinda. If you are reading this post then you are still subscribe to my RSS feed (thank you kind person) or you have stumbled across this site for the info from one of my old postings. This entry was posted in Security Active. April 29, 2012. When Does DLP (Data Loss Prevention) Make Sense? I read Dan Raywood’s SC article this week called “Criticisms made of lax attitudes to data loss prevention tools”. In the article Andrew Waite...
SecurityArchitect's Blog - bilişim ve yazılım güvenliği, reversing , exploiting...
Progea Movicon SCADA Zero-day. IE Use After Free Analizi (CVE-2012-4792). Introduction to ARM Exploitation. ARM Reversing ve Exploiting Hakkında Türkçe Makale. CVE-2012-0667 Güvenlik Açığının Analizi. Progea Movicon SCADA Zero-day. Tarih 17 Aralık 2013. Reverse Engineering (Tersine Mühendislik). 24 Kasım 2013 tarihinde Pastebin’de , Progea Movicon SCADA zafiyetleriyle ilgili bir paylaşımda. Ülkemizde de hem özel sektör hem kamu tarafında bu şekilde ciddi ve koordineli çalışan kurumları yakında göreceğimi...
security awareness – making security understandable
Exposed by failure…. Exposed by failure…. October 13, 2017. I know it is a bold statement, but today information security gets the headlines because of the exposure due to massive outbreaks of attacks that hit companies failing to protect themselves and the data of others. Your virtual castle only channels the bad guys, it does not deter or prevent them from stealing your data.…. Read More Read More. October 13, 2017. Read More Read More. The good, the bad and the unknown. October 13, 2017. A few days ag...
Security Balance
Security geek who writes about whatever comes to his mind: almost nothing :-). Wednesday, March 7, 2018. From my Gartner Blog - The Virtual Patch Analyst. Is there a need, or place for a “virtual patch analyst”? If you look at our guidance on vulnerability management. Hard, but not impossible. Is there anyone out there working on such role? I would love to hear more about it! The post The Virtual Patch Analyst. Appeared first on Augusto Barros. From Augusto Barros http:/ ift.tt/2FnCdUl. Links to this post.
Default Web Site Page
If you are the owner of this website, please contact your hosting provider: [email protected]. It is possible you have reached this page because:. The IP address has changed. The IP address for this domain may have changed recently. Check your DNS settings to verify that the domain is set up correctly. It may take 8-24 hours for DNS changes to propagate. It may be possible to restore access to this site by following these instructions. For clearing your dns cache. There has been a server misconfiguration.
Security Blitz Blog
This Domain May Be For Sale. We will get back to you shortly. Paypal, Credit Card or.
securitycadets.com
SecurityCafe | Holistic Security Discussion - It's a combination of physical, IT, and personal
Holistic Security Discussion – It’s a combination of physical, IT, and personal. Question was asked: “Are we concerned with a decrease of privacy in the virtual space? September 28th, 2009. Why does this matter concerning privacy in the virtual space? They are not in it to make money and therefore do not have the same concerns to protect your information. If it doesn’t benefit them they won’t do it. They are political in nature so privacy is a hindrance to them. Http:/ www.cato-at-liberty.org/200...Third...
Index of /
SOCIAL ENGAGEMENT