What we're reading, week of 9/29

From Network Security Blog… Be compliant through security Martin McKeay suggests that it is possible to be compliant and yet still insecure, and points us to an article from CSO Online that outlines the steps toward compliance through security. From...

What we’re reading, week of 9/29

From Network Security Blog… Be compliant through security Martin McKeay suggests that it is possible to be compliant and yet still insecure, and points us to an article from CSO Online that outlines the steps toward compliance through security. From...

What we're reading, week of 9/22

Security bloggers are all over the story of VP nominee Sarah Palin’s hacked email account this week. Some of the best coverage: From Zero Day… Attacker: Hacking Sarah Palin’s email was easy Dancho Danchev describes, step-by-step, exactly how Palin’s...

What we’re reading, week of 9/22

Security bloggers are all over the story of VP nominee Sarah Palin’s hacked email account this week. Some of the best coverage: From Zero Day… Attacker: Hacking Sarah Palin’s email was easy Dancho Danchev describes, step-by-step, exactly how Palin’s...

What we're reading, week of 9/15

Last week, we pointed to a post from Andy, IT Guy, about the concept of “Failure of Investment” to measure security initiatives. As this idea has taken root and inspired some discussion among other bloggers, this week we’ll explore the reaction to...