Twitter
LinkedIn
RSS

Posts Tagged ‘coding’


ISC StormCast for Monday, April 14th 2014 http://isc.sans.edu/podcastdetail.html?id=3933, (Sun, Apr 13th)

(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Read More...

Sunday Reading, (Sun, Mar 2nd)

The original article/video can be found at Sunday Reading, (Sun, Mar 2nd)

Read More...

How the Bitcoin protocol actually works

How the Bitcoin protocol actually works — 5 retweets 4 favorites

Read More...

Visualising Singapore’s mobile phone data with core.matrix

Visualising Singapore‚Äôs mobile phone data with core.matrix — 3 retweets 3 favorites

Read More...

New Book Released: Secure Coding in C and C++, Second Edition

This book identifies the root causes of today’s most widespread software vulnerabilities, shows how they can be exploited, reviews the potential consequences, and presents secure alternatives.

Read More...

Security is Inconvenient, Deal With It!

“ZD Net had an article entitled “Kernel vulnerability places Samsung devices at risk” and I thought “so, what's new” until I followed the link to the forum post on xda-developers. Then I just lost it because I'm certain that this is a result of plain and simple laziness. Here are my arguments for why I think it's laziness: First, This is Samsung we're talking about here….”

Read More...

Cyber espionage threats against Australia rise: ASIO

“Cyber terrorism and espionage have been highlighted as growing threats to Australian organisations and government departments, according to a new annual report by the Australian Security Intelligence Organisation (ASIO). The Annual Report 2011-12, which was tabled in the federal parliament this week, found that ASIO completed more than 150,000 counter terrorism security assessments during the reporting period. Emerging technology and an Internet-connected world offer new avenues of espionage, read the report….”

Read More...

Buggy out the Door: Externally Discovered Defects (EDD)

“Are your customers, or more broadly 3rd parties, finding more bugs in your code than you are? Are your development organizations releasing code that has poor quality stamped all over it? Recently I saw a report that had this graphic in it, and my mind wandered a little….”

Read More...

Software Security Assurance: Figuring Out the Developers

“Lately, this blog has been all abuzz with DevOps, cloud topics and enterprise resiliency. Today I wanted to take us back to where this blog started – App Security. Sometimes you hear someone say something so controversial it sounds ridiculous, and your first reaction is ridicule and dismissal…

Read More...

Detecting Unknown Application Vulnerabilities "In Flight"

“Deploying code faster, on the order of multiple times per day, is the essence of the modern ultra-agile enterprise. Nick Galbreath who works over at Etsy talks about this quite often, so much so that his latest presentation on SlideShare caught my attention

Read More...