iisf.ie
Irish Information Security Forum
https://www.iisf.ie/page/vendors/1516
Irish Information Security Forum. IISF Vendor Register Sponsored by. Contact the IISF today if you would like to become a sponsor and be featured prominemtly in this panel. PLATINUM, GOLD or SILVER Sponsorships available. The Dyre Wolf Campaign: Stealing Millions and Hungry for More. IBM Security has identified an active campaign using a variant of Dyre malware that has successfully stolen more than $1 million from targeted enterprise organizations. We are here to help. My rep page (IE). IISF Members / S...
droidsec.cn
Android APP安全测试入门 | DroidSec.cn | Android安全中文站
http://www.droidsec.cn/app安全测试入门
2015移动安全挑战赛 阿里&看雪主办 全程回顾. 从0到TrustZone第一篇 探究高通的 SEE 安全可执行环境. 人手一份核武器 – Hacking Team 泄露 开源 资料导览手册.
securityonwheels.blogspot.com
Kevin Beaver's Security Blog: 5/24/15 - 5/31/15
http://securityonwheels.blogspot.com/2015_05_24_archive.html
You can't secure what you don't acknowledge. Friday, May 29, 2015. What you (really) need to know about esophageal manometry. Aside from my typical computer security-related blog posts I thought I’d branch out and share something completely unrelated in hopes it can benefit others. Up one of your nostrils and all the way down to the entry point of your stomach.a medical procedure undoubtedly similar to pre-1800’s era surgeries: awful, seemingly inhumane, and without anesthesia. Had I known that:. 8226; I...
securityonwheels.blogspot.com
Kevin Beaver's Security Blog: Don't get blinded by the "small stuff" that's hard to notice
http://securityonwheels.blogspot.com/2015/04/dont-get-blinded-by-small-stuff-thats.html
You can't secure what you don't acknowledge. Wednesday, April 15, 2015. Don't get blinded by the "small stuff" that's hard to notice. One of the core challenges you face in information security is getting so caught up in the minutiae of your network environment and day-to-day work that you end up not being able to see the bigger picture: what's really going on, what really needs attention, and what really matters. I've been writing about this for over a decade. And I've yet to stop spreading the word.
securityonwheels.blogspot.com
Kevin Beaver's Security Blog: I'm featured in the new issue of Entrepreneur Magazine
http://securityonwheels.blogspot.com/2010/01/im-featured-in-new-issue-of.html
You can't secure what you don't acknowledge. Friday, January 15, 2010. I'm featured in the new issue of Entrepreneur Magazine. Check this out. I'm featured in the January 2010 issue of Entrepreneur Magazine's Ask A Pro section where I talk about employee monitoring. In this piece, it may not be clear whether or not I support monitoring of employee email so let me clarify. I'm not. For micromanagement and Big Brother but I am. On the side of business. On IT It's also creating security issues. Not only...
securityonwheels.blogspot.com
Kevin Beaver's Security Blog: A core reason why security challenges go unresolved
http://securityonwheels.blogspot.com/2015/04/a-core-reason-why-security-challenges.html
You can't secure what you don't acknowledge. Tuesday, April 7, 2015. A core reason why security challenges go unresolved. Constantly dealing with information security issues in your organization? It's really about dealing with management, peers, and subordinates. Here's some motivation:. The ability to deal with people is as purchasable a commodity as sugar of coffee, and I will pay more for that ability than for any other under the sun.". John D. Rockefeller. Posted by Kevin Beaver. Follow me on Twitter.
securityonwheels.blogspot.com
Kevin Beaver's Security Blog: 3/8/15 - 3/15/15
http://securityonwheels.blogspot.com/2015_03_08_archive.html
You can't secure what you don't acknowledge. Tuesday, March 10, 2015. Using Checkmarx CxSuite to outline "the rest of the story" regarding application security. When it comes to Web application and mobile app security, can you honestly say you know where everything. Stands.as American radio personality Paul Harvey. Used to proclaim - the rest of the story. Note that I emphasize "automated" source analysis because n o security professional of value. There are a dozen more low-priority findings that you ca...
imasint.com
Fuentes | i + Int
http://imasint.com/fuentes
Innovación e Inteligencia IT Security. Sitios web y cumplimiento normativo. Normativa sobre comunicaciones electrónicas. Las cookies en la LSSI. Estas son algunas de las fuentes de las que se nutre este blog. Se incluyen enlaces a las empresas ligadas al ámbito de la seguridad de la información, pero también a un buen número de sitios institucionales (CERT’s, organismos, etc.), de empresas del sector de la seguridad TI, consultoras, blogs de culto y más. Enviar a dirección de correo electrónico.
SOCIAL ENGAGEMENT