skip to main
skip to sidebar
View my complete profile
My Blog List
Schneier on Security
Confusing Security Risks with Moral Judgments
Interesting research that shows we exaggerate the risks of something when we find it morally objectionable. From an article about and interview with the re...
12 hours ago
Google Online Security Blog
Guided in-process fuzzing of Chrome components
Posted by Max Moroz, Chrome Security Engineer and Kostya Serebryany, Sanitizer Tsar In the past, we’ve posted about innovations in fuzzing, a software test...
1 week ago
Updated PhD Thesis Title
Yesterday I posted Latest PhD Thesis Title and Abstract. One of my colleagues Ben Buchanan subsequently contacted me via Twitter and we exchanged a few me...
1 month ago
Network Security Blog
NSP Microcast – G Data Summit – Natalya Kaspersky
It’s taken me a lot longer than it should have, but I finally got my interview with Natalya Kaspersky, CEO of InfoWatch and former CEO of Kaspersky Labs fr...
Important Security News Flash Regarding SSH Vulnerabilities
The SSH protocol that is embedded on Unix, Linux, Mainframe, and Windows 16 Servers – in additional to Switches, Routers, IOT devices, etc. can be compromi...
Verizon Business Security Blog
Society of Payment Security Professionals - Compliance Demystified