skip to main
skip to sidebar
View my complete profile
My Blog List
Lack of Training and Resources Plagues IT Security Teams
Although some organizations have splintered cybersecurity from IT for structural purposes, typically IT teams shoulder the responsibility for security. Thi...
1 hour ago
Schneier on Security
ISO Rejects NSA Encryption Algorithms
The ISO has decided not to approve two NSA-designed block encryption algorithms: Speck and Simon. It's because the NSA is not trusted to put security ahead...
3 hours ago
Google Online Security Blog
Safe Browsing: Protecting more than 3 billion devices worldwide, automatically
Posted by Stephan Somogyi, Safe Browsing Emeritus and Allison Miller, Security & Privacy *[Cross-posted from The Keyword]* In 2007, we launched Safe Brows...
1 week ago
Latest Book Inducted into Cybersecurity Canon
Thursday evening Mrs B and I were pleased to attend an awards seminar for the Cybersecurity Canon. This is a project sponsored by Palo Alto Networks and l...
4 months ago
Network Security Blog
NSP Microcast – G Data Summit – Natalya Kaspersky
It’s taken me a lot longer than it should have, but I finally got my interview with Natalya Kaspersky, CEO of InfoWatch and former CEO of Kaspersky Labs fr...
1 year ago
Verizon Business Security Blog
Society of Payment Security Professionals - Compliance Demystified