Publication: Securosis Highlights

First reported Apr 16 2014 - Updated Apr 16 2014 - 1 reports

Incite 4/16/2014: Allergies

It was a crummy winter. Cold. Snowy. Whiplash temperature swings. Over the past few weeks, when ATL finally seemed to warm up for spring (and I was actually in town), I rejoiced. One of the advantages of living a bit south is the temperate weather from ... [Published Securosis Highlights - Apr 16 2014]
First reported Apr 15 2014 - Updated Apr 15 2014 - 1 reports

Understanding Role Based Access Controls - Role Lifecycle

Roles based access control (RBAC) has earned a place in many companies’ access control architecture. Companies have lots of questions on how to effectively use roles, such as “how to integrate role based systems with the applications I have? How do I ... [Published Securosis Highlights - Apr 15 2014]
First reported Apr 15 2014 - Updated Apr 15 2014 - 1 reports

Can’t Unsee (and the need for better social media controls)

I have to admit that the USAirways porno tweet had me cracking up. [Business Insider has good coverage](http://www.businessinsider.com/us-airways-pornographic-tweet-2014-4 (and even the NSFW link, if you are a glutton for well, whatever). It was funny ... [Published Securosis Highlights - Apr 15 2014]
First reported Apr 14 2014 - Updated Apr 14 2014 - 1 reports

Responsibly (Heart)Bleeding

Yeah, we hit on the Heartbleed vulnerability in this week’s FireStarter , but I wanted to call attention to how Akamai handled the vulnerability. They first came out with an announcement that their networks (and their customers) were safe because ... [Published Securosis Highlights - Apr 14 2014]
First reported Apr 14 2014 - Updated Apr 14 2014 - 1 reports

Firestarter: Three for Five

In this week’s Firestarter the team makes up for last week and voters three different stories, each with a time limit. It’s like one of those ESPN shows, but with less content and personality. - Rich(0) Comments Subscribe to our daily email digest ... [Published Securosis Highlights - Apr 14 2014]
Entities: ESPN
First reported Apr 13 2014 - Updated Apr 13 2014 - 1 reports

FFIEC’s Rear View Mirror

You have to love compliance mandates, especially when they are anywhere from 18 months to 3 years behind the threat. Recently the FFIEC (the body that regulates financial institutions) published some guidance for the financials to defend against DDoS ... [Published Securosis Highlights - Apr 13 2014]
First reported Apr 09 2014 - Updated Apr 09 2014 - 1 reports

Understanding Role Based Access Control [New Series]

Identity and Access Management (IAM) is a marathon not a sprint. Most enterprises begin their IAM journey by strengthening authentication, establishing single sign on, and automated provisioning. These are excellent starting points for an enterprise ... [Published Securosis Highlights - Apr 09 2014]
First reported Apr 07 2014 - Updated Apr 07 2014 - 1 reports

Defending Against DDoS: Mitigations

Our past two posts discussed network-based Distributed Denial of Device (DDoS) attacks and the tactics used to magnify those attacks to unprecedented scale and volume . Now it’s time to wrap up this series with a discussion of defenses. To understand ... [Published Securosis Highlights - Apr 07 2014]
First reported Apr 04 2014 - Updated Apr 04 2014 - 1 reports

Big Data Security 2.0 [New Series]

Big data, both the technology and the industry, have taken off. We are past the point where we can call big data a fad, and recognize that we’re staring straight into the face of the next generation of data storage platform. It was about 2 years ago ... [Published Securosis Highlights - Apr 04 2014]
First reported Apr 03 2014 - Updated Apr 03 2014 - 1 reports

Booth Babes Be Gone

OK. I’ve changed my tune. I’ve always been laissez faire about booth babes. I come from the school of what works. And if booth babes generate leads, of which some statistically result in deals, I’m good. Mr. Market says that if something works, you keep ... [Published Securosis Highlights - Apr 03 2014]
First reported Apr 02 2014 - Updated Apr 02 2014 - 1 reports

Incite 4/2/2014: Disruption

The times they are a-changin’. Whether you like it or not. Rich has hit the road, and has been having a ton of conversations about his Future of Security content, and I have adapted it a bit to focus on the impact of the cloud and mobility on network ... [Published Securosis Highlights - Apr 02 2014]
First reported Apr 01 2014 - Updated Apr 01 2014 - 1 reports

Breach Counters

The folks at the Economist (with some funding from Booz Allen Hamilton, clearly doing penance for bringing Snow into your Den) have introduced the CyberTab cyber crime cost calculator. And no, this isn’t an April Fool’s joke. The Economist is now chasing ... [Published Securosis Highlights - Apr 01 2014]

More Content

All (73) | News (0) | Reports (0) | Blogs (73) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Incite 4/16/2014: Allergies [Published Securosis Highlights - Apr 16 2014]
Understanding Role Based Access Controls - Role... [Published Securosis Highlights - Apr 15 2014]
Can’t Unsee (and the need for better social med... [Published Securosis Highlights - Apr 15 2014]
Responsibly (Heart)Bleeding [Published Securosis Highlights - Apr 14 2014]
Firestarter: Three for Five [Published Securosis Highlights - Apr 14 2014]
FFIEC’s Rear View Mirror [Published Securosis Highlights - Apr 13 2014]
Understanding Role Based Access Control [New Se... [Published Securosis Highlights - Apr 09 2014]
Defending Against DDoS: Mitigations [Published Securosis Highlights - Apr 07 2014]
Big Data Security 2.0 [New Series] [Published Securosis Highlights - Apr 04 2014]
Booth Babes Be Gone [Published Securosis Highlights - Apr 03 2014]
Incite 4/2/2014: Disruption [Published Securosis Highlights - Apr 02 2014]
Breach Counters [Published Securosis Highlights - Apr 01 2014]
Defending Against DDoS: Magnification [Published Securosis Highlights - Mar 31 2014]
Defending Against DDoS: The Attacks [Published Securosis Highlights - Mar 30 2014]
Analysis of Visa’s Proposed Tokenization Spec [Published Securosis Highlights - Mar 28 2014]
Security Sharing [Published Securosis Highlights - Mar 28 2014]
Friday Summary: March 28, 2014—Cloud Wars [Published Securosis Highlights - Mar 28 2014]
Mike’s Upcoming Webcasts [Published Securosis Highlights - Mar 27 2014]
Incite 3/26/2014 — One Night Stand [Published Securosis Highlights - Mar 27 2014]
Incite 3/12/2014: Digging Out [Published Securosis Highlights - Mar 12 2014]
Advanced Endpoint and Server Protection: Quick ... [Published Securosis Highlights - Mar 10 2014]
Research Revisited: Security Snakeoil [Published Securosis Highlights - Feb 25 2014]
New Paper: The Future of Security The Trends an... [Published Securosis Highlights - Feb 25 2014]
Research Revisited: RSA/NetWitness Deal Analysis [Published Securosis Highlights - Feb 25 2014]
Research Revisited: The Data Breach Triangle [Published Securosis Highlights - Feb 24 2014]
Research Revisited: 2006 Incites [Published Securosis Highlights - Feb 23 2014]
Research Revisited: The 3 Dirty Little Secrets ... [Published Securosis Highlights - Feb 23 2014]
Apple Bug Bad. Patch Now. Here Are Good Writeups [Published Securosis Highlights - Feb 22 2014]
Firestarter Happy Hour- RSA 2014 (With an Audio... [Published Securosis Highlights - Feb 22 2014]
Summary: A Little Tipsy, a Little Edgy [Published Securosis Highlights - Feb 21 2014]
1 2 3
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Incite 4/16/2014: Allergies [Published Securosis Highlights - Apr 16 2014]
It was a crummy winter. Cold. Snowy. Whiplash temperature swings. Over the past few weeks, when ATL finally seemed to warm up for spring (and I was actually in town), I rejoiced. One of the advantages of living a bit south is the temperate weather from ...
Understanding Role Based Access Controls - Role... [Published Securosis Highlights - Apr 15 2014]
Roles based access control (RBAC) has earned a place in many companies’ access control architecture. Companies have lots of questions on how to effectively use roles, such as “how to integrate role based systems with the applications I have? How do I ...
Can’t Unsee (and the need for better social med... [Published Securosis Highlights - Apr 15 2014]
I have to admit that the USAirways porno tweet had me cracking up. [Business Insider has good coverage](http://www.businessinsider.com/us-airways-pornographic-tweet-2014-4 (and even the NSFW link, if you are a glutton for well, whatever). It was funny ...
Responsibly (Heart)Bleeding [Published Securosis Highlights - Apr 14 2014]
Yeah, we hit on the Heartbleed vulnerability in this week’s FireStarter , but I wanted to call attention to how Akamai handled the vulnerability. They first came out with an announcement that their networks (and their customers) were safe because ...
Firestarter: Three for Five [Published Securosis Highlights - Apr 14 2014]
In this week’s Firestarter the team makes up for last week and voters three different stories, each with a time limit. It’s like one of those ESPN shows, but with less content and personality. - Rich(0) Comments Subscribe to our daily email digest ...
1 2 3 4 5 6 7 8 9 10 ...
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.