Skip to main content

Security Bloggers Network Social Security Awards 2014 Finalists Announced

This year, award winners will be recognized in multiple categories, including Best Corporate Security Blog, Best Security Blog, Most Educational Security Blog, Most Entertaining Security Blog, Blog that Best Represents the Security Industry, Single Best Blog or Podcast of the Year, The Security Bloggers Hall of Fame and Best New Security Blog. This year's sponsors include Kaspersky Lab,   Sourcefire (now part of Cisco), Akamai, Fortinet, Tripwire, Barracuda Networks, Qualys, RSA Conference and Trainer Communications
Nominees this year are
Juniper Networks: Security & Mobility Now, Norse,
RedSeal Networks,
Solutionary: Minds,
VioPoint,
WhiteHat Security,
TripWire: The State of Security,
Veracode,
Mandiant: M-unition,
Fortinet, F-SECURE,
Trend Micro TrendLabs Security Intelligence,
Kaspersky Lab: Securelist,
Akamai,
Bit9,
IOActive,
SANS: Daily Internet Storm Center Stormcast,
michsec,
TripWire: Security Slice,
Threat Post,
The Security Ledger,
The Risk Science Podcast,
SecurityWeekly,
Securosis: Firestarter,
Terabrate,
Electronic Frontier Foundation (EFF): Deeplinks,
Security bistro,
Graham Cluley,
Krebs on Security,
Identropy,
Dell: SecureWorks,
Securosis,
SecurityStreetRapid7,
Krypt3ia,
Kevin Townsend,
Matt Blaze's Exhaustive Search,
The New School of Information Security,
Uncommon Sense Security,
Errata Security,
Schneier on Security,
Sophos: nakedsecurity,
SANS: Internet Storm Center Diary,
Liquidmatrix Security Digest,
Emergent Chaos,
Infosec Island,
RedSeal Networks: Making Security Works,
Terabrate: Book Review: "We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous and the Global Cyber Insurgency (2012)" by Parmy Olson, Krebs on Security: Adobe To Announce Source Code, Customer Data Breach, Schneier On Security: Why It's Important to Publish the NSA Programs, CERIAS: On Competitions and Competence, Security Uncorked: CISSPs: Call to Action for (ISC)2 Elections (Nov 16-30), Police-Led Intelligence-Led Policing: Banning Feds from DefCon is Self Defeating. Here's Why, IOActive: "Broken Hearts": How plausible was the Homeland pacemaker hack?, The Hackers Post, J4VV4D, Dan Kaminsky's Blog, Martin McKeay Network Security Blog, Andy Greenberg, ForbesLori MacVittie, F5 DevCentral, Tracy Kitten, The Fraud Blog, Eric Chabrow, The Public Eye, Gunter Ollmann, Dark Reading, Attacks and BreachesJitender's Perspective, OMENSPortal, Cyb3r-Assassin, Security Management HQ, Exploring Possibility Space, Venafi, and USA TODAY: CyberTruth.


View article...

Comments

Popular posts from this blog

LinuxGuruz Netfilter IPTABLES Firewall Page

The Netfilter Project Homepage http://www.netfilter.org Source Code Userspace code (tar.bz2) http://www.netfilter.org/files/iptables-1.3.0.tar.bz2 FAQ Netfilter/Iptables FAQ http://netfilter.samba.org/documentation/FAQ/netfilter-faq.html Firewall Forensics (What am I seeing?) FAQ http://www.robertgraham.com/pubs/firewall-seen.html Network Intrusion Detection Systems - IDS http://www.robertgraham.com/pubs/network-intrusion-detection.html Sniffing (network wiretap, sniffer) FAQ http://www.robertgraham.com/pubs/sniffing-faq.html Linux IP Masquerade FAQ http://en.tldp.org/HOWTO/IP-Masquerade-HOWTO/ Firewall Admins Guide to Porn FAQ http://www.robertgraham.com/pubs/firewall-pr0n.html Hacking Lexicon - hacking dictionary http://www.robertgraham.com/pubs/hacking-dict.html Submit a FAQ Link or URL http://www.linuxguruz.com/iptables/#links Scripts Home LAN masquerading http://the-devil.dnsalias.net/home/extremist_MASQ Home LAN ip6t...

How to Address the Patching Paradox

Analyze your vulnerability response capabilities.  Assess vulnerability detection and patching capabilities to identify vulnerability response issues. Tackle low-hanging fruit first.  Prioritize minor vulnerability response problems and build a comprehensive vulnerability response strategy over time. Eliminate barriers between security and IT teams.  Combine vulnerability and IT configuration data into a single platform to drive collaboration between security and IT teams. Create end-to-end vulnerability response processes.  Develop vulnerability response processes and ensure that security and IT teams have a shared view of these processes. Retain security talent.  Remove internal barriers, optimize day-to-day processes and automate mundane work; by doing so, an organization can create a positive environment for security teams, increase employee satisfaction and boost the likelihood of retaining top security talent. Manual vulnerability response process...

mobile application Security Testing

Apps that enterprises develop themselves (or have developed by outsourcers) must be tested, to ensure they’re not leaking customer data or opening the enterprise to attack It’s cheaper and faster to test apps pre-production than it is after deployment Automated testing of mobile software is faster and more effective than manual testing Mobile applications interact with back-end web servers and services that also need to be tested That’s where AppScan® comes in What customers struggle with: Deploying secure mobile applications – both iOS and Android Static testing of mobile applications for security exposures, prior to deployment Inability to assess security of mobile applications developed by outsourcers Finding resources to test application code Understanding security risks of the mobile application environment Bringing together mobile application testing results with back-end web application and services resu...