Sitemap - 2011 - Security Balance

Complexity

Monitoring the Policy

Log reviews and PCI

Policy exceptions

Security by virtualization: where is the secure OS?

OpenFlow

1 Raindrop: Assurance of Assessments

Old stuff, always good to keep in mind

Automation and security

Unrealistic Security Expectations - part 2

Unrealistic Security Expectations - part 1

Dilbert - Alice could add a mention to ROSI too

Software security

ShackF00 » Infosec Subjectivity: No Black and White

Win Remes petition

Why is security not taken seriously?

Researchers decrypt data on mobile networks | InSecurity Complex - CNET News

NetSPI Blog » Echo Mirage: Piercing the Veil of Thick Application Security

Black Hat and Defcon FUD season has just started!

PCI - Data at rest encryption and 3.4.1

SQL Injection is 95% SQL, and the Rest of InfoSec is the Same

Risk Management again

Explaining hacking episodes

Different perspective on SecurID

Lenny Zeltser on Information Security — 6 Ideas for a Protean Information Security Architecture

Information classification and Threat centric approaches

Good analysis of the LM case

SecuriTeam Blogs » Simple passwords are the solution

Lastpass

Lenny Zeltser on Information Security — Tracking Known Malicious Websites by ETag Identifiers

Vulnerability reporting in the age of social media - F-Secure Weblog : News from the Lab

Toronto (sunset)

ShackF00 » Less Talk, More Action

Reporting breaches to SEC

Web applications security - one size does not fit all

Post Mortem lessons from Amazon

Must read for those working with vuln. management

McAfee VirusScan Enterprise: False Positive Detection Generic.dx!yxk in DAT 6329

Eliminating redundancies...

Will we see the return of low level vulnerabilities?

Quick comments on the Verizon DBIR 2011 report

Beware of "low impact" in risk assessments

World Economic Forum 2011 Risk Report

1 Raindrop: "I know" and "I don't know" schools of security architecture

Not so fast about SecurID

Light Blue Touchpaper » Blog Archive » Can we Fix Federated Authentication?

Is Risk assessment just change resistance?

Lenny Zeltser on Information Security — 7 Inconvenient Truths for Information Security

Deputies

the most important infosec word

The key issue on current risk measurement?

The great IT risk measurement debate

RSA Conference: Ben Rothke: Security Reading Room: Everything I need to know about PowerPoint, I learned from Adi Shamir

That was a real Fire starter!

Oddjob, new?

What all those flames can tell us about the Infosec industry?

Lenny Zeltser on Information Security — 5 Addictions of Information Security Professionals

Security Management guidance

The never-ending discussion of security models

Interesting Citrix/Windows information disclosure vulnerability

Infosec’s Flu « The New School of Information Security

Great piece by Anton Aylward on IT Architecture

Virtual desktops and incident response

Banks may soon require new online authentication steps - Computerworld

What drives the RA? Need or Fashion? » http://infosecblog.antonaylward.com

Parabéns São Paulo

New blog engine