The Trustworthy Internet Movement, a non-profit initiative formed in February to help address ongoing security issues on the internet, has unveiled its first project – an online dashboard called SSL Pulse that monitors the quality of SSL support across websites. View full post on Techworld.com security View full post on…
InfoSec 2012: One in 10 second-hand hard drives contain personal data
The Information Commissioner’s Office has published a report revealing that one in ten second-hand hard drives sold online contains residual personal data, with some containing scanned bank statements, passports, information on previous driving offences, and medical details. View full post on Techworld.com security View full post on National Cyber Security…
InfoSec 2012: IBM launches new threat analytics engine
IBM is growing its Security Systems unit with the launch of a new threat analytics appliance, which the company claims can identify suspicious behaviour in the network to protect organisations against hidden threats. IBM launched its Security Systems division in October 2011, drawing together disparate security products developed by IBM…
IT comparison site comparetheware.com launches at InfoSec
Comparetheware.com, a new IT search portal that enables businesses to research and compare technologies and find suppliers, has launched at the InfoSecurity conference in London today. The website aims to help any organisation that needs to make an IT purchase to research the product, compare specifications and prices, ask for…
Gregory Evan’s Blog Sites Are Ripping Contents from Infosec Blogs
The self-proclaimed “World’s No.1 Hacker” Gregory Evans has proved to the world how a douche bag he really is. Aside from being the world’s no.1 pawned hacker, he is also using wp-robots in his blog sites like amihackerproof.com, hitechcrimesolutions.com, nationalcybersecurity.com, locatepc.net, gregorydevans.com,etc. to rip of fcontents from other Information…
Identifying Infosec Jobs, Skills, Tasks
NICE’s Ernest McDuffie says a proposed cybersecurity workforce framework represents a consensus of government thought on how best to define the jobs, skills and tasks needed to secure information technology. View full post on CUInfoSecurity.com RSS Syndication View full post on National Cyber Security
What’s Biosurveillance Got to Do with Infosec?
Thinking Strategically, Not Just TacticallyThinking strategically, not just tactically. View full post on CUInfoSecurity.com Blogs RSS Syndication View full post on National Cyber Security
ProtectMyID: RT @SecurityWeek: Top Attack Techniques Used By Today’s Hackers http://t.co/E0hqzRSg #hacking #infosec
ProtectMyID: RT @SecurityWeek: Top Attack Techniques Used By Today’s Hackers http://t.co/E0hqzRSg #hacking #infosec View full post on Twitter / ProtectMyID View full post on National Cyber Security Gregory Evans | LinkedIn Interview With Gregory Evans Gregory Evans Security Expert Gregory Evans on Cyber Crime