• SSDs, encryption and decommissioning

    Updated: 2011-02-28 14:00:10
    A research paper about the secure erasure of data on SSDs has raised a lot of discussion. What steps do you need to take when decommissioning a disk? Read more…

  • OWASP chapter comes to Queensland - please join us if you can!

    Updated: 2011-02-28 02:44:36
    Will you be in Brisbane, Queensland on Tuesday 01 March 2011? Are you interested in learning about security and meeting a bunch of like-minded people? If so, why not attend the inaugural meeting of the OWASP Brisbane chapter? (It's free.) Read more…

  • Martin Ward Blog Central

    Updated: 2011-02-25 16:11:36
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive February 2011 32 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 263 Corporate 187 Enterprise 317 McAfee Labs 1044 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government identity protection identity theft malware McAfee McAfee Identity Protection McAfee Initiative to Fight Cybercrime Mid-Market Mobile mobile

  • HIPAA fines prove the value of data protection

    Updated: 2011-02-25 03:27:41
    This week the US Department of Health and Human Services levied the first fines under the HIPAA act. Now that they have proven they mean business, other health care organizations need to be sure they have the proper protections in place. Read more…

  • EMET Lends a Hand

    Updated: 2011-02-25 03:22:09
    I didn’t think Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) made much of a splash when it arrived. I vaguely remember hearing about it, and only decided to check it out when I saw a tweet about it. The basic idea is that it acts as an extra layer of protection against the current generation of [...]

  • Factoring Pentest/Scan Results into Formal Risk Analysis

    Updated: 2011-02-22 20:16:28
    News flash: Those so-called “risk” labels/ratings included in pentest and vuln scan reports are NOT actually “risk” representations. I was in attendance at the OWASP Summit 2011 a couple weeks back, and the topic of “risk metrics” and labels came up during one session. As a result, I led a break-out session on what risk [...]

  • PKI’s Ubiquity

    Updated: 2011-02-16 19:58:04
    Greetings from the 2011 RSA Conference in rainy San Francisco, CA. Yesterday I attended the opening keynotes of the conference, and a certain statement by RSA’s Art Coviello caught my ear and needs some further discussion. The conference opened with a fantastic video called “Giants Among Us” which provided a brief chronicle of the rise [...]

  • Compromises and Security

    Updated: 2011-02-15 00:30:55
    Your own users, with no malice, regularly compromise security every day. Odds are, they train new hires to do the same thing. Why are they undermining your work?

  • The Other Mobile Hacking

    Updated: 2011-02-12 00:51:57
    The buzz around smartphone and tablet app hacking has started to increase even more since the beginning of the year. But also making some waves in recent weeks has been the application of existing technology to allow vehicles to communicate. Automobile companies have been in the news lately concerning the Vehicle-To-Vehicle (V2V) communication system. This [...]

  • Two-Factor Authentication Goes Mainstream

    Updated: 2011-02-10 17:37:33
    Stop and think about what an attacker could do if they gained control of your e-mail account. Many web sites let you reset your password via an e-mailed link. Poorly designed services may even send a copy of the password to your inbox. Much of your personal information is likely reflected in conversations you’ve had [...]

  • Identity Theft Without Even Trying

    Updated: 2011-02-09 18:59:49
    Last week, we received a fax at the office from a branch of Virginia Commerce Bank. It was addressed to “Katie” and had our fax number clearly written on the cover sheet. The cover sheet had this interesting quote: This facsimile, which may contain confidential or legally privileged information, is intended for the use of [...]

  • Well, This Should Be Fun

    Updated: 2011-02-08 22:27:12
    You know those Facebook applications that occasionally pop up on your news feed, promising to add a “dislike” button, let you view who’s been looking at your profile, or implement some other feature that Facebook won’t ever support?  A lot of these applications are not much more than thinly disguised malware designed to harvest personal [...]

  • Armitage: Fast and Easy Metasploit Hacking

    Updated: 2011-02-03 14:11:01
    I had the good fortune to attend ShmooCon 2011 last weekend. A new tradition at ShmooCon is evening “firetalks” on Friday and Saturday. Basically, after the conference has ended for the day, a bunch of folks decide to put off parties for a few more hours in order to do a bunch of 15-minute “get [...]

  • February 2011 Blog Central

    Updated: 2011-02-02 05:04:17
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive February 2011 1 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 240 Corporate 183 Enterprise 314 McAfee Labs 1042 Tags Acquisition Channel Partners Compliance Consumer critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security Endpoint Protection enterprise facebook Family Safety global threat intelligence google government identity protection malware McAfee McAfee Initiative to Fight Cybercrime Mid-Market Mobile mobile security Network Security Operation Aurora PCI

Current Feed Items | Previous Months Items

Jan 2011 | Dec 2010 | Nov 2010 | Oct 2010 | Sep 2010 | Aug 2010