blog.meesqa.com
security – MEE SQA Blog
http://blog.meesqa.com/category/security
Michael E. Ensminger's thoughts on software development, testing and quality assurance. Categories of Cyber Attack. January 23, 2016. The Sept./Oct. 2012. Issue of CrossTalk: The Journal of Defense Software Engineering in the article Identifying Cyber Ecosystem Security Capabilities. By Peter M. Fonash has a table of cyber attack categories. The list is presented here for reference:. Improper Usage (Insider Attack. Physical Action / Loss or Theft of Equipment. March 28, 2015. September 27, 2014. Package ...
acsac.org
Call for Submissions - Security Conference, Security Training & Security Networking - ACSAC 2015
https://www.acsac.org/2015/cfp
December 7–11, 2015 Hilton Los Angeles/Universal City Los Angeles, California, USA. 2015 Annual Computer Security Applications Conference. ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences. We solicit submissions that address the application of security technology, the implementation of systems, and lessons learned. While we are interested in a variety of topics. We sol...
acsac.org
Call for Case Studies - Security Conference, Security Training & Security Networking - ACSAC 2015
https://www.acsac.org/2015/cfp/case-studies
December 7–11, 2015 Hilton Los Angeles/Universal City Los Angeles, California, USA. 2015 Annual Computer Security Applications Conference. Call for Case Studies. When are case study presentations due? The deadline for submitting presentations is June 8. What is a case study presentation? How do I submit a case study presentation? Submit a short paragraph describing your proposed presentation to the Case Studies Chair. Again, all proposals shall be submitted to the Case Studies Chair. Presentations that h...
acsac.org
Call for Papers - Security Conference, Security Training & Security Networking - ACSAC 2015
https://www.acsac.org/2015/cfp/papers
December 7–11, 2015 Hilton Los Angeles/Universal City Los Angeles, California, USA. 2015 Annual Computer Security Applications Conference. When are papers due? The deadline for submitting papers is June 8. 23:59:59 US EDT). Authors will be notified of acceptance by approximately August 15. What should I propose a paper on? Special consideration will be given to papers that discuss system implementation, deployment, and lessons learned. What awards are given for papers? What makes a good ACSAC paper?
acsac.org
Student Conferenceship Award - Security Conference, Security Training & Security Networking - ACSAC 2015
https://www.acsac.org/2015/cfp/students
December 7–11, 2015 Hilton Los Angeles/Universal City Los Angeles, California, USA. 2015 Annual Computer Security Applications Conference. What is the Student Conferenceship Award? To be considered for the Conferenceship Program, the following information should be submitted to the Student Conferenceship Awards Chair. Name, address, and name of institution. Course work applicable to a career in information system security and grades received in those courses. Who do I contact for more information? For mo...
acsac.org
Hard Topic - Security Conference, Security Training & Security Networking - ACSAC 2015
https://www.acsac.org/2015/cfp/hardtopic
December 7–11, 2015 Hilton Los Angeles/Universal City Los Angeles, California, USA. 2015 Annual Computer Security Applications Conference. Security and Privacy in the Internet of Things (IoTs). Ndash; New Security Paradigms Workshop. Ndash; Learning from Authoritative Security Experiment Results.
acsac.org
Committees - Security Conference, Security Training & Security Networking - ACSAC 2015
https://www.acsac.org/2015/committees
December 7–11, 2015 Hilton Los Angeles/Universal City Los Angeles, California, USA. 2015 Annual Computer Security Applications Conference. Stephen Schwab, USC Information Sciences Institute. Micah Sherr, Georgetown University. Wil Robertson, Northeastern University. Larry Wagoner, NSA. National Interest Track Chair. Charles Payne, Adventium Labs. Hassan Takabi, University of North Texas. Suzanne McIntosh, Cloudera and NYU. Posters and Works-in-Progress Chair. Thomas Moyer, MIT Lincoln Laboratory. Davide ...
trust-news.blogspot.com
TRUST Security and Privacy Blog: Please do not change your password
http://trust-news.blogspot.com/2010/04/please-do-not-change-your-password.html
TRUST Security and Privacy Blog. Security and Privacy news items. Tuesday, April 13, 2010. Please do not change your password. Mark Pothier's Boston Globe article, Please do not change your password. Covers a paper by Microsoft Researcher Cormac Herley. So Long, and No Thanks for the Externalities: the Rational Rejection of Security Advice by Users. From the 2009 New Security Paradigms Workshop. But does password aging actually help? There was some discussion on TechRepublic.