Top Stories

E595c1d49bf4a26f8e14ce59812af80e

Two-Factor Authentication Transforms Even ‘123456’ Into a Secure Password

January 29, 2015 Added by:Patrick Oliver Graf

Since 2011, the same two passwords have ranked as the most common (and worst) among users. Care to take a guess as to what they are?

Comments  (4)

Latest Posts

3caea4d9bcdd5cde2b1a1f338a06a086

Digital Reputation: Can’t Buy it, Gotta Earn It

January 29, 2015 Added by:Jonathan Curtis

Can’t buy it, gotta earn it, as the old saying goes. With a few short searches, it is easy to find tweets that have had a significant impact on the reputation of institutions, police departments, online ecommerce properties, and corporations in 2014.

Comments  (3)

E595c1d49bf4a26f8e14ce59812af80e

Two-Factor Authentication Transforms Even ‘123456’ Into a Secure Password

January 29, 2015 Added by:Patrick Oliver Graf

Since 2011, the same two passwords have ranked as the most common (and worst) among users. Care to take a guess as to what they are?

Comments  (4)

C787d4daae33f0e155e00c614f07b0ee

Interview with Accuvant co-founder Dan Wilson

January 29, 2015 Added by:Robb Reck

In 2014 I began my quest to interview some of the most interesting folks in the Colorado security community. On a recent trip, I set out to talk with the biggest security shop in town… Accuvant I reached out through some of my friends over there and was set up a meeting with one of the co-founders, Dan Wilson.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Suits and Spooks DC 2015: The Agenda - Last Chance to Register

January 29, 2015 Added by:Mike Lennon

Suits and Spooks DC is less than one week away! The event will be held at the Ritz-Carlton, Pentagon City on February 4-5. Due to multiple sell-out events, we have expanded our attendee capacity to 200, but the event is again close to being sold out.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Thought Experiment: Mandatory Online Banking Security Standards

January 28, 2015 Added by:Tripwire Inc

Banks are required by law to follow government regulations; these subject the banks to specific requirements, restrictions and guidelines. The end goal being, among other things, transparency.

Comments  (1)

Ebb72d4bfba370aecb29bc7519c9dac2

Defeat The Casual Attacker First!!

January 28, 2015 Added by:Anton Chuvakin

I have not done a philosophical security blog post for a long time – and now I was suddenly inspired to write one while installing – rather, replacing with an HD version – security cameras at my house.

Comments  (0)

6d117b57d55f63febe392e40a478011f

New Legislation on Threat Intelligence Sharing May Have a Chance

January 28, 2015 Added by:Anthony M. Freed

But the four cybersecurity legislation bills that were approved last month did not address all of the top concerns, namely the creation of an information-sharing platform that would enable better information exchange about cyber-based threats between the public and private sectors.

Comments  (2)

Af7244bb99debb4a1152fa49a993a05c

Google Says It’s Not Practical to Fix Flaws in Pre-KitKat Android

January 27, 2015 Added by:Eduard Kovacs

Researchers reported earlier this month that Google was no longer patching vulnerabilities affecting the WebView component in Android Jelly Bean (4.3) and prior.

Comments  (3)

Ebb72d4bfba370aecb29bc7519c9dac2

Do You Want “Security Analytics” Or Do You Just Hate Your SIEM?

January 27, 2015 Added by:Anton Chuvakin

Now that I’ve taken a fair number of “security analytics” client inquiries (with wildly different meanings of the phase), I can share one emerging pattern: a lot of this newly-found “analytics love” is really old “SIEM hatred” in disguise.

Comments  (1)

Ebe141392ea3ebf96ba918c780ea1ebe

Looking Logically at Legislation

January 27, 2015 Added by:Wendy Nather

There's a lot of fuss around the recent White House proposal to amend the Computer Fraud and Abuse Act, and some level-headed analysis of it. There's also a lot of defensive and emotional reaction to it ("ZOMG we're going to be illegal!").

Comments  (1)