Interesting Bits

Here we go:

/dev/random » Blog Archive » Anonymous Packet Capture

Best Practices For DLP Content Discovery: Use Cases |

Rafal Los : Security and Compliance - Strange Bedfellows Indeed

Alert Logic » Seeking security superstring

Your Turn at The Bar Again? Security Costs in a Pay Per Drink Cloud | Cloud Security

Andrew Hay » Blog Archive » Kraken Botnet Infiltration Triggers Ethics Debate - Quoted in eWeek

Back from Washington D.C. (No thanks to SuperShuttle) |

Uncommon Sense Security: Defense in Depth?

Hacking Store Credit Card Readers « Amrit Williams Blog

StillSecure, After All These Years: Is NAC clawing its way up the slope of enlightenment?

I, Cringely . The Pulpit . If we build it they will come | PBS

Have a great day!



Happy May day all 🙂 And now for something completely different....okay, not really. Here are today's interesting bits:

Pragmatic CSO Newsletter #53 | Security Incite: Analysis on Information Security

Richi Jennings: Your Reputation in Peril: Use Outbound Spam Filtering: Stuff 'n' nonsense about email, spam, travel, and life in the UK.

Rational Survivability: Poetic Virtual Security

Farfromr00tin: Azureus Web UI XSS

Carnal0wnage Blog: Penetration Testing Scheduling - web application security: Can you hit a moving target?

Coding Horror: The Great Dub-Dub-Dub Debate

Andy, ITGuy: I hack Johnny Long

Random Thoughts from Joel's World: ISC Podcast Episode 3 - Winlockpwn: More then a Partytrick

Declassified NSA Document Reveals the Secret History of TEMPEST | Threat Level from

Have a great day!



Interesting Bits – April 29th, 2008

by kriggins on April 29, 2008

in Interesting Bits

Good morning. Another busy day in the blogosphere. We have another good batch of interesting missives today.

Risk and Understanding All the Variables « Neohapsis Labs - New versions of fgdump and pwdump released

Risk Management and Car Talk |

iPhone Security Tip: Never Memorize Wireless Networks |

Robert Penz Blog » Plausibility checks

Gin, Television, and Social Surplus - Here Comes Everybody

P2P Security Study Released - Realtime IT Compliance

TippingPoint | DVLabs | Owning Kraken Zombies, a Detailed Dissection

Napera Networks » 1st Pacific Rim Regional Collegiate Cyber Defense Competition

Hack in the Box: Dubai | Infosec Events

Black Hat Europe 2008 | Infosec Events

Random Thoughts from Joel's World: Focus

PDF, Let Me Count the Ways… « Didier Stevens

Security Thoughts: Security Catalyst Forums

Service Level Automation in the Datacenter: Yahoo goes Social with Paas Offering

Security x.0 - 2FA is dead

Coding Horror: Programmers

Don't Read Books -- But You Should

Intentional Security Blindness |

Yup, a bunch of stuff. Happy reading and have a great day!



Interesting Bits – April 28th, 2008

by kriggins on April 28, 2008

in Interesting Bits

I was away for a couple days, so the list today is a bit longer. Some good stuff though:

Visit to the Workshop: A Do It Yourself Identity Management Solution (IdM)

Blunt Instruments

Web 2.0 and “Defense in Depth”

Whose Risk?

Was the LendingTree Insider Data Breach Avoidable?

Be careful with what you leave behind

5 Security Metrics That Matter

Cloud Stacks: Please Mind The Gap

Spear Phishing with Better Business Bureau complaints

What Was Your Epiphany?<

12 Signs that Your Company is Already in the Cloud

Wireless Scanning

Dissecting the Automatic Patch-Based Exploit Generator

10 Myths About Life As An IT Security Professional

My Webapplication Firewall.

Have a great day!



Interesting Bits – April 22nd, 2008

by kriggins on April 22, 2008

in Interesting Bits - Issue 16 is out.

  • Security policy considerations for virtual worlds
  • US political elections and cybercrime
  • Using packet analysis for network troubleshooting
  • The effectiveness of industry certifications
  • Is your data safe? Secure your web apps
  • RSA Conference 2008 / Black Hat 2008 Europe
  • Windows log forensics: did you cover your tracks?
  • Traditional vs. non-tranditional database auditing
  • Payment card data: know your defense options
  • Security risks for mobile computing on public WLANs: hotspot registration
  • Network event analysis with Net/FSE
  • Producing secure software with security enhanced software development processes
  • AND MORE! - Share your experience. Be a mentor.

Defense in Depth, Reconsidered: Is Information Security Anything Like War? - An interesting read about defense in depth.

{ 1 comment }