Production-ready ZFS offers cosmic-scale storage f…
Production-ready ZFS offers cosmic-scale storage for Linux bit.ly/11XeSm8
Production-ready ZFS offers cosmic-scale storage for Linux bit.ly/11XeSm8
March 31, 2013
ATM skimming comes to non-ATM payment terminals in train stations, etc bit.ly/YUf8f9
March 31, 2013
Comments Off on From: Digital Bond’s SCADA Security Portal – Friday News & Notes
a quick re-post from Digital Bond's SCADA Security Portal http://www.digitalbond.com/blog/2013/03/29/friday-news-notes-69/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+digitalbond%2FoLPM+%28Digital+Bond%29 Friday News & Notes by Dale Peterson A NATO research team of experts has determined that Stuxnet was an act of war. “Acts that kill or injure persons or destroy or damage objects are unambiguously uses of force.” The use of force is only allowed in […]
March 31, 2013
Comments Off on From: Securosis Highlights – Friday Summary: March 29, 2013
a quick re-post from Securosis Highlights https://securosis.com/blog/friday-summary-march-29-2013 Friday Summary: March 29, 2013 by (author unknown) Our last nine months of research into identity and access management have yielded quite a few surprises – for me at least. Many of these new perspectives I have shared piecemeal in various blogs, and others not. But it occurred […]
March 31, 2013
Comments Off on From: Securosis Highlights – Defending Cloud Data: How IaaS Storage Works
a quick re-post from Securosis Highlights https://securosis.com/blog/defending-cloud-data-how-iaas-storage-works Defending Cloud Data: How IaaS Storage Works by (author unknown) Infrastructure as a Service storage can be insanely complex when you include operational and performance requirements. First you need to create a resource pool, which might itself be a pool of virtualized and abstracted storage, and then you […]
March 31, 2013
Comments Off on From: Securosis Highlights – DDoS Attack Overblown
a quick re-post from Securosis Highlights https://securosis.com/blog/ddos-attack-overblown DDoS Attack Overblown by (author unknown) Sam Biddle at Gizmodo says: This guy, Prince said, could back up CloudFlare’s claims. This really was Web Dresden, or something. After an inquiry, I was ready to face vindication. Instead, I received this note from a spokesperson for NTT, one of […]
March 31, 2013
Comments Off on From: The Mac Security Blog – What to Do if Your iPhone Gets Stolen
a quick re-post from The Mac Security Blog http://www.intego.com/mac-security-blog/what-to-do-if-your-iphone-gets-stolen/ What to Do if Your iPhone Gets Stolen by Lysa Myers Theft is a lame and unfortunate risk of living in close proximity to other humans. In the case of iPhones, it’s a growing problem. But there are things you can do to make the theft […]
March 31, 2013
Comments Off on From: threatpost – The First Stop for Security News – How I Got Here: Chris Wysopal
a quick re-post from threatpost – The First Stop for Security News http://threatpost.com/en_us/blogs/how-i-got-here-chris-wysopal-032813 How I Got Here: Chris Wysopal by Dennis Fisher Dennis Fisher talks with Chris Wysopal of Veracode about his journey from a teenage BBS user to member of the L0pht to respected security researcher. Known as Weld Pond since his days at […]
March 31, 2013
Comments Off on From: Securosis Highlights – Estimating Breach Impact
a quick re-post from Securosis Highlights https://securosis.com/blog/estimating-breach-impact Estimating Breach Impact by (author unknown) Russell Thomas and a bunch of his friends recently posted a research paper called How Bad Is It? – A Branching Activity Model to Estimate the Impact of Information Security Breaches, which attempts to provide a structure for estimating the impact of […]
March 31, 2013
Comments Off on From: Securosis Highlights – Defending Cloud Data: IaaS Encryption
a quick re-post from Securosis Highlights https://securosis.com/blog/defending-cloud-data-iaas-encryption Defending Cloud Data: IaaS Encryption by (author unknown) Infrastructure as a Service (IaaS) is often thought of as merely as a more efficient (outsourced) version of our traditional infrastructure. On the surface you still manage things that look like simple virtualized networks, computers, and storage. You ‘boot’ computers […]
March 31, 2013
1