Browsing All Posts filed under »reading«

From: Securosis Highlights – Friday Summary: March 29, 2013

March 31, 2013

Comments Off on From: Securosis Highlights – Friday Summary: March 29, 2013

a quick re-post from Securosis Highlights https://securosis.com/blog/friday-summary-march-29-2013 Friday Summary: March 29, 2013 by (author unknown) Our last nine months of research into identity and access management have yielded quite a few surprises – for me at least. Many of these new perspectives I have shared piecemeal in various blogs, and others not. But it occurred […]

From: Securosis Highlights – Defending Cloud Data: How IaaS Storage Works

March 31, 2013

Comments Off on From: Securosis Highlights – Defending Cloud Data: How IaaS Storage Works

a quick re-post from Securosis Highlights https://securosis.com/blog/defending-cloud-data-how-iaas-storage-works Defending Cloud Data: How IaaS Storage Works by (author unknown) Infrastructure as a Service storage can be insanely complex when you include operational and performance requirements. First you need to create a resource pool, which might itself be a pool of virtualized and abstracted storage, and then you […]

From: Securosis Highlights – DDoS Attack Overblown

March 31, 2013

Comments Off on From: Securosis Highlights – DDoS Attack Overblown

a quick re-post from Securosis Highlights https://securosis.com/blog/ddos-attack-overblown DDoS Attack Overblown by (author unknown) Sam Biddle at Gizmodo says: This guy, Prince said, could back up CloudFlare’s claims. This really was Web Dresden, or something. After an inquiry, I was ready to face vindication. Instead, I received this note from a spokesperson for NTT, one of […]

From: The Mac Security Blog – What to Do if Your iPhone Gets Stolen

March 31, 2013

Comments Off on From: The Mac Security Blog – What to Do if Your iPhone Gets Stolen

a quick re-post from The Mac Security Blog http://www.intego.com/mac-security-blog/what-to-do-if-your-iphone-gets-stolen/ What to Do if Your iPhone Gets Stolen by Lysa Myers Theft is a lame and unfortunate risk of living in close proximity to other humans. In the case of iPhones, it’s a growing problem. But there are things you can do to make the theft […]

From: threatpost – The First Stop for Security News – How I Got Here: Chris Wysopal

March 31, 2013

Comments Off on From: threatpost – The First Stop for Security News – How I Got Here: Chris Wysopal

a quick re-post from threatpost – The First Stop for Security News http://threatpost.com/en_us/blogs/how-i-got-here-chris-wysopal-032813 How I Got Here: Chris Wysopal by Dennis Fisher Dennis Fisher talks with Chris Wysopal of Veracode about his journey from a teenage BBS user to member of the L0pht to respected security researcher. Known as Weld Pond since his days at […]

From: Securosis Highlights – Estimating Breach Impact

March 31, 2013

Comments Off on From: Securosis Highlights – Estimating Breach Impact

a quick re-post from Securosis Highlights https://securosis.com/blog/estimating-breach-impact Estimating Breach Impact by (author unknown) Russell Thomas and a bunch of his friends recently posted a research paper called How Bad Is It? – A Branching Activity Model to Estimate the Impact of Information Security Breaches, which attempts to provide a structure for estimating the impact of […]

From: Securosis Highlights – Defending Cloud Data: IaaS Encryption

March 31, 2013

Comments Off on From: Securosis Highlights – Defending Cloud Data: IaaS Encryption

a quick re-post from Securosis Highlights https://securosis.com/blog/defending-cloud-data-iaas-encryption Defending Cloud Data: IaaS Encryption by (author unknown) Infrastructure as a Service (IaaS) is often thought of as merely as a more efficient (outsourced) version of our traditional infrastructure. On the surface you still manage things that look like simple virtualized networks, computers, and storage. You ‘boot’ computers […]

From: Securosis Highlights – Incite 3/27/2013: Office Space

March 31, 2013

Comments Off on From: Securosis Highlights – Incite 3/27/2013: Office Space

a quick re-post from Securosis Highlights https://securosis.com/blog/incite-3-27-2013-office-space Incite 3/27/2013: Office Space by (author unknown) A lot of folks ask me how I work from home. My answer is simple: I don’t. I have a home office, but I do the bulk of my work from a variety of coffee shops in my local area. So […]

From: The Register – Production-ready ZFS offers cosmic-scale storage for Linux

March 31, 2013

Comments Off on From: The Register – Production-ready ZFS offers cosmic-scale storage for Linux

a quick re-post from The Register http://www.theregister.co.uk/2013/03/30/zfs_on_linux_production_ready/ Production-ready ZFS offers cosmic-scale storage for Linux by (author unknown) Über-reliable filesystem now ready for wide deployment The maintainers of the native Linux port of the ZFS high-reliability filesystem have announced that the most recent release, version 0.6.1, is officially ready for production use.…

From: Boing Boing – ATM skimming comes to non-ATM payment terminals in train stations, etc

March 31, 2013

Comments Off on From: Boing Boing – ATM skimming comes to non-ATM payment terminals in train stations, etc

a quick re-post from Boing Boing http://boingboing.net/2013/03/29/atm-skimming-comes-to-non-atm.html ATM skimming comes to non-ATM payment terminals in train stations, etc by Cory Doctorow ATM skimming isn’t limited to ATMs! There are lots of terminals that ask you to swipe your card and/or enter a PIN, and many of them are less well-armored and -policed than actual cashpoints. […]