Sitemap - 2007 - Security Balance

I'm alive!

Another bot prediction that comes true

New trends, new threats

Honeytokens on databases

Right on the bullseye about the insider threat

Pete Lindstrom and Linda Stutsman about "best practices"

Finally something good about NAC

Spafford and magical solutions

Another post on the wall

Application Security and MS

Log mining

Good analogy

Gunnar Peterson and security budget

Killer encryption application

Brazilian Bank Trojans

About SIEMs and insider threats

DLP and honeytokens

Security Bingo

PSI, from Secunia

How to kick ass

XML being used by malware - We said it!!!

Grossman on Web App Vuln Scanners

Bejtlich - versions

Phrack

Stration worm

CC numbers are everywhere

Risk Management - measuring all components of the equation

HotBot papers

Power

Security Architecture Blueprint

SSL FTP on Longhorn

Enabling business

Joanna and Mr. Chuvakin

Two-factor authentication and Banks

WEP? No chance

Botnets trends

PCI problems

Is the personal firewall necessary?

Path of least resistance

The Kid is growing!

Posts you hang on the wall

Virtualization and Security

Cobit 4.0 and other standards

Audit Quality and Freakonomics

Those five mistakes over encryption

Encryption Mistakes, masterpiece by Chuvakin

Storm Worm and some old predictions

I wanna be a Security Evangelist

Features and the security point of view

Thoughts on MS Security Intelligence Report

Log Injection

Fix Users

Black Hat Europe - Here we go!

Modern malware

Other view about anomaly-based detection

ROI

Security monitoring - NSM and Logs

Silver Bullet Podcast

EV SSL - Was it really necessary?

PCI, PCI, PCI! OK, but are they focusing at the right things?

Best Practices?

Symantec and SONAR

They are watching us!

New MS VPN Protocol - or new backdoor covert channel?

Compliance solution in-a-box

Security Theater

Classification products

Smart defense in depth example

About Web Applications Security

Very very good blog

Quote of the week