Skip to content


  1. Cloud Customization and Compliance November 30, 2011

    Posted in Security.

    No comments
  2. RockYou.com Breach: $292K per user November 29, 2011

    Posted in Security.

    No comments
  3. What’s the Matter with IT in Kansas: Brownback Edition November 29, 2011

    Posted in Security.

    No comments
  4. Legal Threats to Security Research November 28, 2011

    Posted in Security.

    2 comments
  5. BayThreat 2011: Sharpening the Axe November 28, 2011

    Posted in History, Sailing, Security.

    No comments
  6. Facebook FAIL: ID mixup leads to lawsuit November 28, 2011

    Posted in History, Security.

    No comments
  7. DB dump rescues lost dog November 28, 2011

    Posted in Security.

    No comments
  8. Case Study: Virtualization and PCI Compliance November 28, 2011

    Posted in Energy, Security.

    No comments
  9. Software bug haiku November 27, 2011

    Posted in Poetry, Security.

    No comments
  10. Kenya Enters War with Somalia November 23, 2011

    Posted in Security.

    No comments
  11. Today in 1944: the 584th Squadron of the 394th Bomb Group November 21, 2011

    Posted in History, Security.

    6 comments
  12. Fuzz and the NeXT Computer November 20, 2011

    Posted in History, Security.

    No comments
  13. Search, Social Engineering and the 4th Amendment November 20, 2011

    Posted in Security.

    No comments
  14. EAST Report 3: ATM Cash Trapping November 19, 2011

    Posted in Security.

    No comments
  15. My Life as a Turkey November 17, 2011

    Posted in Security.

    No comments
  16. Jaguar XF Diesel in America: Road Test November 13, 2011

    Posted in Energy, Security.

    3 comments
  17. Data Loss as Art November 12, 2011

    Posted in Security.

    No comments
  18. Android Phone Ads Banned November 10, 2011

    Posted in Security.

    No comments
  19. Cloud Security: 云安全之合规性:访Flyingpenguin总裁 November 8, 2011

    Posted in Security.

    No comments
  20. VXLAN Primer November 7, 2011

    Posted in Security.

    No comments
  21. US Security Experts Bemoan “Colander” Model November 7, 2011

    Posted in Food, History, Security.

    No comments
  22. Running Risks While Running November 6, 2011

    Posted in Security.

    No comments
  23. Risks and Controls in Cloud Computing: Updated ISACA Schedule November 5, 2011

    Posted in Security.

    No comments
  24. ESXistentialism and Remote Logs November 5, 2011

    Posted in Security.

    1 comment
  25. NIST Cloud Roadmap SP 500-293 November 2, 2011

    Posted in Security.

    No comments