The Latest in IT Security

Posts Tagged ‘security procedures’

About a year after I started at the National Security Agency, I suffered the embarrassment of being caught violating #nsa #security procedures. I was totally guilty and it was quite humiliating, as you can imagine. It was made worse by how easily it could have been avoided. Welcome to the National Security Agency My first […]

Read more ...

A new statement claiming to be from the founder of Silk Road 2.0 arrived on both Silk Road forums and Pastebin today, detailing the new Tor-powered security procedures that owners say will keep users entirely anonymous. Never forget that they can only ever seize assets – they can never arrest our spirit. The statement also […]

Read more ...

Yesterday the WordPress team gifted writers with the release of version 3.2 of the open source blogging platform. While their focus was rightly on all of the cool new features and enhancements their community will enjoy, I naturally wanted to focus on the changes that may have an impact on security. The biggest announcement was […]

Read more ...


Categories

FRIDAY, MARCH 29, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments