Skip to main content

Security Bloggers Network Social Security Awards 2014 Finalists Announced

This year, award winners will be recognized in multiple categories, including Best Corporate Security Blog, Best Security Blog, Most Educational Security Blog, Most Entertaining Security Blog, Blog that Best Represents the Security Industry, Single Best Blog or Podcast of the Year, The Security Bloggers Hall of Fame and Best New Security Blog. This year's sponsors include Kaspersky Lab,   Sourcefire (now part of Cisco), Akamai, Fortinet, Tripwire, Barracuda Networks, Qualys, RSA Conference and Trainer Communications
Nominees this year are
Juniper Networks: Security & Mobility Now, Norse,
RedSeal Networks,
Solutionary: Minds,
VioPoint,
WhiteHat Security,
TripWire: The State of Security,
Veracode,
Mandiant: M-unition,
Fortinet, F-SECURE,
Trend Micro TrendLabs Security Intelligence,
Kaspersky Lab: Securelist,
Akamai,
Bit9,
IOActive,
SANS: Daily Internet Storm Center Stormcast,
michsec,
TripWire: Security Slice,
Threat Post,
The Security Ledger,
The Risk Science Podcast,
SecurityWeekly,
Securosis: Firestarter,
Terabrate,
Electronic Frontier Foundation (EFF): Deeplinks,
Security bistro,
Graham Cluley,
Krebs on Security,
Identropy,
Dell: SecureWorks,
Securosis,
SecurityStreetRapid7,
Krypt3ia,
Kevin Townsend,
Matt Blaze's Exhaustive Search,
The New School of Information Security,
Uncommon Sense Security,
Errata Security,
Schneier on Security,
Sophos: nakedsecurity,
SANS: Internet Storm Center Diary,
Liquidmatrix Security Digest,
Emergent Chaos,
Infosec Island,
RedSeal Networks: Making Security Works,
Terabrate: Book Review: "We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous and the Global Cyber Insurgency (2012)" by Parmy Olson, Krebs on Security: Adobe To Announce Source Code, Customer Data Breach, Schneier On Security: Why It's Important to Publish the NSA Programs, CERIAS: On Competitions and Competence, Security Uncorked: CISSPs: Call to Action for (ISC)2 Elections (Nov 16-30), Police-Led Intelligence-Led Policing: Banning Feds from DefCon is Self Defeating. Here's Why, IOActive: "Broken Hearts": How plausible was the Homeland pacemaker hack?, The Hackers Post, J4VV4D, Dan Kaminsky's Blog, Martin McKeay Network Security Blog, Andy Greenberg, ForbesLori MacVittie, F5 DevCentral, Tracy Kitten, The Fraud Blog, Eric Chabrow, The Public Eye, Gunter Ollmann, Dark Reading, Attacks and BreachesJitender's Perspective, OMENSPortal, Cyb3r-Assassin, Security Management HQ, Exploring Possibility Space, Venafi, and USA TODAY: CyberTruth.


View article...

Comments

Popular posts from this blog

ESS

ESS is uniquely qualified to help you secure a new era of computing with: ·          Intelligence  – Enterprise security portfolio, with our expert field professionals, are unmatched in their ability to provide the deep analytics needed to ward off the wide range of threats ·          Integration  – Solutions and services systematically integrate both new and existing security capabilities, giving critical visibility, providing comprehensive controls, and reducing complexity ·          Expertise  – Expertise stems from our hands-on professionals and researchers whose know-how is built into our products and services, provided through real-time client feeds and embedded in our professional engagements