skip to main
skip to sidebar
View my complete profile
My Blog List
My Security Strategy: The "Third Way"
Over the last two weeks I listened to and watched all of the hearings related to the OPM breach. During the exchanges between the witnesses and legislator...
16 hours ago
Schneier on Security
Twitter Followers: Please Use the Correct Feed
The official Twitter feed for my blog is @schneierblog. The account @Bruce_Schneier also mirrors my blog, but it is not mine. I have nothing to do with i...
17 hours ago
A Simpler Way to Research Regulatory Requirements
Commonplace to information security professionals, regulatory compliance does not necessarily guarantee security. However, in a world rife with perpetual b...
19 hours ago
Google Online Security Blog
Announcing Security Rewards for Android
Posted by Jon Larimer, Android Security Engineer Since 2010, our security reward programs have helped make Google products safer for everyone. Last year, w...
2 weeks ago
Network Security Blog
Spying pressure mounting worldwide
It’s been an interesting ride ever since Edward Snowden came out with the revelations about NSA spying efforts two years ago. There was a huge public outc...
1 month ago
Verizon Business Security Blog
Society of Payment Security Professionals - Compliance Demystified