Publication: Securosis Highlights

First reported 21 hours ago - Updated 21 hours ago - 1 reports

Recruiting Across the Spectrum

I really like this story about ULTRA Testing , which hires folks on the autism spectrum to do software testing. The CEO makes a great point here: As a result, he maintains, employers around the world are leaving huge pools of talent untapped because ... [Published Securosis Highlights - 21 hours ago]
First reported Jul 25 2014 - Updated Jul 25 2014 - 1 reports

All Good Things

Side note- we are aware of the site issues and are working hard on them. There were major changes to the platform we use, and it conflicts with our high-security setup. I think we should have it fixed soon, and we apologize. That’s what we get for having ... [Published Securosis Highlights - Jul 25 2014]
First reported Jul 24 2014 - Updated Jul 24 2014 - 1 reports

The 2015 Endpoint and Mobile Security Buyer’s Guide [Updated Paper]

In a rather uncommon occurrence, we updated one of our papers within a year of publication. As mentioned in the latest version of our Endpoint Security Buyer’s Guide, mobile devices are just additional endpoints that need to be managed like any other ... [Published Securosis Highlights - Jul 24 2014]
First reported Jul 24 2014 - Updated Jul 24 2014 - 1 reports

TI+IR/M: Quick Wins

The best way to understand how threat intelligence impacts your incident response/management process is to actually run through an incident scenario with some commentary to provide a tangible example to illuminate the concepts. For simplicity’s sake, ... [Published Securosis Highlights - Jul 24 2014]
First reported Jul 23 2014 - Updated Jul 24 2014 - 2 reports

Cloud File Storage and Collaboration: Core Security Features

*This is part 3 of our Security Pro’s Guide to Cloud File Storage and Collaboration (file sync and share). The full paper is available on GitHub as we write it. See also part 1 and part 2 here . Identity and Access Management Managing users and ... [Published Securosis Highlights - Jul 24 2014]
First reported Jul 23 2014 - Updated Jul 23 2014 - 1 reports

Incite 7/23/2014: Mystic Rhythms

One of the things I most enjoy when the kids are at camp is being able to follow my natural rhythms. During the school year things are pretty structured. Get up at 5, do my meditation, get the kids ready for school, do some yoga/exercise, clean up, and ... [Published Securosis Highlights - Jul 23 2014]
First reported Jul 23 2014 - Updated Jul 23 2014 - 1 reports

TI+IR/M: The New Incident (Response) & Management Process Model

Now that we have the inputs (both internal and external) to our incident response/management process , we’re ready to go operational. So let’s map out the IR/M process in detail and show where threat intelligence and other security data allows you to ... [Published Securosis Highlights - Jul 23 2014]
First reported Jul 22 2014 - Updated Jul 22 2014 - 1 reports

Firestarter: Hacker Summer Camp

In this episode of the Firestarter, Rich, Mike, and Adrian discuss the latest controversial research to hit the news from HOPE and Black Hat. We start with a presentation by Jonathan Zdziarski on data recoverable using forensics on iOS . While technically ... [Published Securosis Highlights - Jul 22 2014]
First reported Jul 21 2014 - Updated Jul 21 2014 - 1 reports

TI+IR/M: Threat Intelligence + Data Collection = Responding Better

In the last post, we defined what was needed to Really Respond Faster , so now let’s peel back the next layer of the onion and delve into the collecting data that will be useful in the investigation from both internal and external perspectives. This ... [Published Securosis Highlights - Jul 21 2014]
First reported Jul 20 2014 - Updated Jul 20 2014 - 2 reports

Leading Security ‘People’

In the July 2 Incite I highlighted Dave Elfering’s discussion of the need to sell as part of your security program. Going through my Instapaper links I came across Dave’s post again, and I wanted to dig a bit deeper. Here is what I wrote in my snippet: ... [Published Securosis Highlights - Jul 20 2014]
First reported Jul 18 2014 - Updated Jul 18 2014 - 1 reports

Friday Summary: July 18, 2014, Rip Van Winkle edition

I have been talking about data centric security all week, so you might figure that’s what I will talk about in this week’s summary. Wrong. That’s because I’m having a Rip Van Winkle moment. I just got a snapshot of where we have been through the last ... [Published Securosis Highlights - Jul 18 2014]
First reported Jul 16 2014 - Updated Jul 16 2014 - 1 reports

Trends in Data Centric Security: Deployment Models

So far we have talked about the need for data centric security, what that means, and which tools fit the model. Now it is time to paint a more specific picture of how to implement and deploy data centric security, so here are some concrete examples of ... [Published Securosis Highlights - Jul 16 2014]

More Content

All (149) | News (0) | Reports (0) | Blogs (149) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Recruiting Across the Spectrum [Published Securosis Highlights - 21 hours ago]
All Good Things [Published Securosis Highlights - Jul 25 2014]
The 2015 Endpoint and Mobile Security Buyer’s G... [Published Securosis Highlights - Jul 24 2014]
TI+IR/M: Quick Wins [Published Securosis Highlights - Jul 24 2014]
Cloud File Storage and Collaboration: Core Secu... [Published Securosis Highlights - Jul 24 2014]
Cloud File Storage and Collaboration: Overview ... [Published Securosis Highlights - Jul 23 2014]
Incite 7/23/2014: Mystic Rhythms [Published Securosis Highlights - Jul 23 2014]
TI+IR/M: The New Incident (Response) & Mana... [Published Securosis Highlights - Jul 23 2014]
Firestarter: Hacker Summer Camp [Published Securosis Highlights - Jul 22 2014]
TI+IR/M: Threat Intelligence + Data Collection ... [Published Securosis Highlights - Jul 21 2014]
Leading Security ‘People’ [Published Securosis Highlights - Jul 20 2014]
Leading Security “People” [Published Securosis Highlights - Jul 20 2014]
Friday Summary: July 18, 2014, Rip Van Winkle e... [Published Securosis Highlights - Jul 18 2014]
Trends in Data Centric Security: Deployment Models [Published Securosis Highlights - Jul 16 2014]
The Security Pros Guide to Cloud File Storage a... [Published Securosis Highlights - Jul 16 2014]
Incite 7/16/2014: Surprises [Published Securosis Highlights - Jul 16 2014]
Are CISOs finally ‘real’ executives? [Published Securosis Highlights - Jul 15 2014]
Firestarter: China and Career Advancement [Published Securosis Highlights - Jul 14 2014]
Leverging TI in Incident Response/Management: R... [Published Securosis Highlights - Jul 14 2014]
It’s Just a Matter of Time [Published Securosis Highlights - Jul 13 2014]
Listen to Rich Talk, Win a ... Ducati? [Published Securosis Highlights - Jul 11 2014]
Summary: Boulder [Published Securosis Highlights - Jul 11 2014]
Trends in Data Centric Security: Tools [Published Securosis Highlights - Jul 09 2014]
Open Source Development and Application Securit... [Published Securosis Highlights - Jul 09 2014]
Incite 7/9/2014 — One dollar… [Published Securosis Highlights - Jul 09 2014]
Leveraging Threat Intelligence in Incident Resp... [Published Securosis Highlights - Jul 08 2014]
Increasing the Cost of Compromise [Published Securosis Highlights - Jul 07 2014]
Trends In Data Centric Security: Use Cases [Published Securosis Highlights - Jul 07 2014]
Incite 7/2/2014 — Relativity [Published Securosis Highlights - Jul 02 2014]
Updating the Endpoint Security Buyer’s Guide: M... [Published Securosis Highlights - Jun 30 2014]
1 2 3 4 5
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Recruiting Across the Spectrum [Published Securosis Highlights - 21 hours ago]
I really like this story about ULTRA Testing , which hires folks on the autism spectrum to do software testing. The CEO makes a great point here: As a result, he maintains, employers around the world are leaving huge pools of talent untapped because ...
All Good Things [Published Securosis Highlights - Jul 25 2014]
Side note- we are aware of the site issues and are working hard on them. There were major changes to the platform we use, and it conflicts with our high-security setup. I think we should have it fixed soon, and we apologize. That’s what we get for having ...
The 2015 Endpoint and Mobile Security Buyer’s G... [Published Securosis Highlights - Jul 24 2014]
In a rather uncommon occurrence, we updated one of our papers within a year of publication. As mentioned in the latest version of our Endpoint Security Buyer’s Guide, mobile devices are just additional endpoints that need to be managed like any other ...
TI+IR/M: Quick Wins [Published Securosis Highlights - Jul 24 2014]
The best way to understand how threat intelligence impacts your incident response/management process is to actually run through an incident scenario with some commentary to provide a tangible example to illuminate the concepts. For simplicity’s sake, ...
Cloud File Storage and Collaboration: Core Secu... [Published Securosis Highlights - Jul 24 2014]
*This is part 3 of our Security Pro’s Guide to Cloud File Storage and Collaboration (file sync and share). The full paper is available on GitHub as we write it. See also part 1 and part 2 here . Identity and Access Management Managing users and ...
1 2 3 4 5 6 7 8 9 10 ...
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.