Innovating The Next Big Thing April 17, 2014 ph.gif
ph.gif
Sections

Strategic Innovator: Journal of Strategic Innovation
Network & Information Security
Terrorism & Counterterrorism
Insurgency & Counterinsurgency
Weapons of Mass Destruction
Homeland Security & Defense
Energy, Infrastructure & Environment
Remembering 9/11
About

Next Innovator Group

TechnologyInnovator
• NextInnovator
EnterpriseInnovator
SecurityInnovator
DefenseInnovator
WirelessInnovator 
• HPinnovator
EnergyInnovator
TransportationInnovator
SMBinnovator (beta)

Contact

• NextInnovator(at)Live.com

Writers Wanted

Writers Wanted

Feedjit Live Web Stats


Terror Alert Level


Homeland Security

Security Innovators

• The Clausewitz Home Page 
Small Wars Journal
Stratfor Geopolitical Weekly
Computerworld Security Blog
eWeek Security Blog
Information Security
Infoworld Zero Day Security
Cheap Hack: Larry Seltzer's New Blog
Security Insights Blog 
McAfee Audio Parasitics
McAfee Avert Labs Blog
Mike Rothman's Blog
Network Computing Daily Blog
NetworkWorld, Buzzblog
Security Fix, Brian Krebs
ZeroDay, Ryan Naraine
Rethinking Security

Next Innovators

Ghost City
Frontline Sentinel
• Innovation Insights
WebInno
Over the River
Enderle Group
Security Insights Blog 
McAfee Audio Parasitics
Rethinking Security
Ovum
iSuppli
Canalys
• eMarketer 
• CRM Help Desk SW 
Rethink Research
The Gadgeteer
Master the Moment

McAfee AudioParasitics


 
Books on Terrorism

Books on Network Security

Books on WMD

Barry's Books

 

Ads

ph.gif ph.gif
Network & Information Security McAfee Blog: Online Tax Time Scams: How to Avoid
Mar 24, 2014 – Filing your taxes online is convenient but also comes with some potential security problems. My job as an expert in all things online-security is to spell out what these online... Read the rest

McAfee Blogs: McAfee SIEM Enables Cloud Security and Reduces time and resources for Compliance demands for DTS
Mar 24, 2014 – DTS is one of the larger systems companies in Germany, with around 140 team members in six locations.  Mid-sized and enterprise companies, as well as public institutions, rely on DTS... Read the rest

McAfee Blog: Google Docs Phishing Campaign is Frighteningly Accurate
Mar 21, 2014 – Gmail users beware: a very convincing, very deceitful, phishing scam has been making its way around the Internet. The scam targets Google Doc and Google Drive users with a lookalike... Read the rest

HP Security Products Blog: Happiness is…securing your app before you launch it!
Mar 20, 2014 – Today is the UN International Day of Happiness, and for us over at HP Security, happiness is securing your app before you launch it!   The bad guys know that... Read the rest

Wireless Watch: Google and Samsung both start with the watch, but then wearables agendas diverge
Mar 20, 2014 – Google and Samsung are the companies which have made Android great, but they often have an uneasy relationship with one another, and this was highlighted this week when they both... Read the rest

Faultline: Vivendi picks the devil it knows best in French bunfight over mobile
Mar 20, 2014 – It was an uncomfortable feeling when we heard this week that Vivendi had gone and preferred the offer for its SFR mobile unit from Vivendi, because only a few days... Read the rest

Faultline: All singing and dancing TV Connect live with OTT, mobile, dongles, RDK
Mar 20, 2014 – TV Connect in London is one of those shows where people just love to announce things, and we came away from it this week with as much to think about... Read the rest

HP Security Products Blog: Big announcements for 4th Annual HP Government Summit
Mar 19, 2014 – With over 500 government customers, including top C-level professionals from agencies like the FBI, DHS, GSA and more, HP had to up-the-ante when it came to speakers for this event!... Read the rest

McAfee Blogs: Smartphone Kill Switch Could Become Federal Law
Mar 18, 2014 – There is no doubt that mobile devices are an integral part of our daily lives, making their potential loss all the more detrimental. Aside from using smartphones to communicate with... Read the rest

McAfee Blogs: Anxious About Summer Already? Create a Family Gadget Plan
Mar 18, 2014 –   The sun is shining, flowers are blooming, and the birds are chirping. It’s a beautiful time of year . . . for the most part. But let’s be real,... Read the rest

McAfee Blogs: What is a Denial-of-Service Attack?
Mar 18, 2014 – You may have heard news reports about popular websites such as CNN, Amazon and Yahoo! being taken down by a DoS attack, but have you ever wondered what DoS means?... Read the rest

McAfee Blogs: Four Pillars Build the Foundation of Successful SIEM
Mar 18, 2014 – Talking with customers during the past few months, the key topics and questions we heard were all about targeted attacks, threat intelligence, and security information and event management (SIEM). However,... Read the rest

McAfee Blogs: Online relationships are Anamorphic Illusions
Mar 17, 2014 – I recently came across a term that was new to me–Anamorphic Illusions.   These illusions are visually incredible! And here I am on THE INTERNET (dun dun duuuuun!) looking up the... Read the rest

McAfee Blogs: Experian ID Theft Exposed 200 Million Consumer Records
Mar 17, 2014 – Experian, one of the largest credit report and protection companies in the U.S., is not having a good time of late. That’s because near the end of 2013 it was... Read the rest

McAfee Blogs: Adaptive Threat Prevention – Reducing Attack Discovery to Containment in Milliseconds
Mar 17, 2014 – In the “Verizon 2013 Data Breach and Investigations Report” 80% of cases (examined by Verizon) a breach wasn’t detected for at least weeks, if not months or years.  Once a... Read the rest

McAfee Blogs: Anonymous, Syrian Electronic Army Lead Recent Hacktivist Actions
Mar 13, 2014 – As a supplement to the latest McAfee Labs Threats Report, published this week, we offer this timeline of leading hacktivist activities that made news in the fourth quarter of 2013.... Read the rest

McAfee Blogs: Analyzing the Uroburos PatchGuard Bypass
Mar 12, 2014 – A few weeks ago G Data Software released a report detailing alleged intelligence agency software. Following the release of that report, BAE Systems published a whitepaper further describing the threat. In... Read the rest

McAfee Blogs: Threats Timeline Tracks Recent Security Breaches
Mar 11, 2014 – As a supplement to the latest McAfee Labs Threats Report, published this week, we offer this timeline of leading threats that made news in the fourth quarter of 2013.  ... Read the rest

HP Security Products Blog: Consumers need security intelligence, too
Mar 11, 2014 – Recently, the  First American Bank of Illinois took the unprecedented step of issuing a warning for its customers not to use their credit cards in Chicago area taxis because of suspected (and ongoing)... Read the rest

McAfee Blogs: Timeline of Bitcoin Events Demonstrates Online Currency’s Volatility
Mar 10, 2014 – The buzz about Bitcoin has moved from online circles to mainstream media sources. Last week’s news of the collapse of exchange Mt. Gox got more play than in just the... Read the rest

McAfee Blogs: Threat Intelligence Exchange: An Old Dog with Plenty of New Tricks
Mar 10, 2014 – This year’s RSA Conference was a major success for McAfee, garnering significant excitement because our McAfee Threat Intelligence Exchange announcement.  In fact one industry analyst told me, “every client I have met... Read the rest

McAfee Blogs: Network Security Perspective: Point-of-Sale, Data Loss, and the Black Market
Mar 10, 2014 – It’s all becoming so nefarious.  Today, we live, work, and play in a world that is riddled with bad guys going to great lengths to undermine the fabric of society... Read the rest

McAfee Blogs: Welcome to the New McAfee Labs Quarterly Threats Report
Mar 9, 2014 – Starting with the McAfee Labs Threats Report: Fourth Quarter 2013 posted today, we’re taking a fresh approach to its format, content, and supporting materials. We had several things in mind... Read the rest

HP Security Products Blog: How to prevent vulnerabilities in WiFi access points
Mar 7, 2014 – Last week, the Homeland Security News Wire posted an article regarding WiFi viruses and how researchers have shown, for the first time, that WiFi networks can be infected with a... Read the rest

McAfee Blogs: Information Week Report Exposes the Risks but Confirms the Strategy
Mar 5, 2014 – Target. Neiman Marcus. These are just two of the very latest victims of today’s increasingly stealthy threats permeating our cyber world.  My post last month entitled, Stolen Data: Network Security... Read the rest

HP Security Products Blog: HP TippingPoint Advanced Threat API debuts at RSA 2014 Conference
Mar 4, 2014 – In today’s technologically advanced world, adversaries have an advantage like never before. They move faster, innovate more broadly, and organize around an underground marketplace. In order to defend ourselves, we... Read the rest

HP Security Products Blog: HP Labs and HP TippingPoint collaborate to stop network attacks
Mar 4, 2014 – HP Labs and HP DVLabs are now working together to bolster the HP TippingPoint ReputationDV feed. Together, we’re improving the amount of malicious domain names in the global data base... Read the rest

HP Security Products Blog: Stop Looking for the Silver Bullet: Start Thinking Like a Bad Guy
Mar 3, 2014 – It's not every day you hear the head of a security products division tell an audience of 10,000 security professionals that the security industry is overinvested in products. Almost 86 percent... Read the rest

HP Security Products Blog: Trojan Horse Worked Against the Greeks, but it Cannot Work Against HP TippingPoint
Feb 27, 2014 – You know the story. The Greeks used a Trojan horse to enter Troy, hiding within it, and overtaking the city “hiding in plain sight”. Troy led its enemy inside, thinking... Read the rest

HP Security Products Blog: What NOT to do for Information Security
Feb 26, 2014 – In the midst of 20,000 users at RSA conference, as I speak with customers, partners, and competitors, I am learning what NOT to do for information security more than what... Read the rest

Older articles »
Search SecurityInnovator

ph.gif ph.gif
Support This Site



Newest Articles

• 4/1 Welcome to Strategic Innovator!
• 4/1 CGSC Special Guest Feature: Closing NATO’s Strategy and Capabilities Gap
• 4/1 CGSC Special Guest Feature: More Money, More Problems: The Role of the Multinational Corporation in the Growth of the Democratic Republic of the Congo Economy
• 4/1 CGSC Special Guest Feature: A New Approach for Development Aid
• 4/1 CGSC Special Guest Feature: Money and Partnership: The Limits of U.S. Economic Power in Latin America
• 4/1 CGSC Special Guest Feature: Mexico, NAFTA, and China
• 4/1 Innovation Insights: Geospatial Technologies and Humanitarian Goals: Can Geospatial Technologies Inspire Sympathy?
• 4/1 Literary Insights: A review of Richard Rumelt’s 2011 Good Strategy/Bad Strategy
• 4/1 The Fast-Changing Arctic: Widely reviewed and now in over 100 libraries worldwide!
• 4/1 Culture, Conflict and COIN Now in 85 Libraries!
• 4/1 The Realist Tradition in International Relations -- Foundations of Western Order: Now in over 500 libraries worldwide!
• 3/24 McAfee Blog: Online Tax Time Scams: How to Avoid
• 3/24 McAfee Blogs: McAfee SIEM Enables Cloud Security and Reduces time and resources for Compliance demands for DTS
• 3/21 McAfee Blog: Google Docs Phishing Campaign is Frighteningly Accurate
• 3/20 HP Security Products Blog: Happiness is…securing your app before you launch it!
• 3/20 Wireless Watch: Google and Samsung both start with the watch, but then wearables agendas diverge
• 3/20 Faultline: Vivendi picks the devil it knows best in French bunfight over mobile
• 3/20 Faultline: All singing and dancing TV Connect live with OTT, mobile, dongles, RDK
• 3/19 HP Security Products Blog: Big announcements for 4th Annual HP Government Summit
• 3/18 McAfee Blogs: Smartphone Kill Switch Could Become Federal Law
• 3/18 McAfee Blogs: Anxious About Summer Already? Create a Family Gadget Plan
• 3/18 McAfee Blogs: What is a Denial-of-Service Attack?
• 3/18 McAfee Blogs: Four Pillars Build the Foundation of Successful SIEM
• 3/17 McAfee Blogs: Online relationships are Anamorphic Illusions
• 3/17 McAfee Blogs: Experian ID Theft Exposed 200 Million Consumer Records
• 3/17 McAfee Blogs: Adaptive Threat Prevention – Reducing Attack Discovery to Containment in Milliseconds
• 3/13 McAfee Blogs: Anonymous, Syrian Electronic Army Lead Recent Hacktivist Actions
• 3/12 McAfee Blogs: Analyzing the Uroburos PatchGuard Bypass
• 3/11 McAfee Blogs: Threats Timeline Tracks Recent Security Breaches
• 3/11 RSIS Reports: Update on Iran’s Total Near 20 Percent Enriched Uranium Stock : Nearly E nough for a B omb, if Further Enriched 1
• 3/11 HP Security Products Blog: Consumers need security intelligence, too
• 3/10 McAfee Blogs: Timeline of Bitcoin Events Demonstrates Online Currency’s Volatility
• 3/10 RSIS Reports: The Iran Primer- Centrifuges: Key to Final Nuclear Deal
• 3/10 McAfee Blogs: Threat Intelligence Exchange: An Old Dog with Plenty of New Tricks
• 3/10 McAfee Blogs: Network Security Perspective: Point-of-Sale, Data Loss, and the Black Market
• 3/9 McAfee Blogs: Welcome to the New McAfee Labs Quarterly Threats Report
• 3/7 HP Security Products Blog: How to prevent vulnerabilities in WiFi access points
• 3/5 RSIS Reports: Case Study - Chinese National Sought High-Strength Carbon Fiber for China
• 3/5 McAfee Blogs: Information Week Report Exposes the Risks but Confirms the Strategy
• 3/4 HP Security Products Blog: HP TippingPoint Advanced Threat API debuts at RSA 2014 Conference
• 3/4 HP Security Products Blog: HP Labs and HP TippingPoint collaborate to stop network attacks
• 3/3 HP Security Products Blog: Stop Looking for the Silver Bullet: Start Thinking Like a Bad Guy
• 2/27 HP Security Products Blog: Trojan Horse Worked Against the Greeks, but it Cannot Work Against HP TippingPoint
• 2/26 HP Security Products Blog: What NOT to do for Information Security
• 2/25 Eco Travel Guide: Review of The Fast Changing Arctic: 'Timely reading, indeed'
• 2/25 RSIS Reports: Changes Visible at Parchin Nuclear Site Why Parchin Matters to a Final Deal
• 2/25 HP Security Products Blog: HP announces HP Fortify Open Review Project at RSA 2014 Conference
• 2/25 HP Security Products Blog: HP sweeps categories at 10th Annual Info Security Global Excellence Awards
• 2/24 RSIS Reports: Additional Centrifuge Plants: Update
• 2/24 RSIS Reports: Update on Lashkar Ab’ad: Iran’s Laser Enrichment Capabilities

AddThis Feed Button

Barry's Books


DefenseLink

• 4/16 Hagel Calls Chile's Disaster Responses 'Model for Region'
• 4/16 U.S. Ship Responds to Scene of Korean Ship Sinking
• 4/16 Face of Defense: Son Follows in Air Force Parents' Footsteps
• 4/16 Helpline Marks 3 Years of Aiding Sexual Assault Victims
• 4/16 'Birdies for the Brave' Tees Up Support for Vets, Families
• 4/15 Obama to Award Medal of Honor to Former Soldier for 2007 Actions
• 4/15 DOD Releases Report on Estimated Sequestration Impacts
• 4/15 Battaglia Brings All-service Panel to Mayport Cadets
• 4/15 Small Business Administrator Visits Military Entrepreneur Class
• 4/15 DOD Seeks Efficiencies in Sustainment, Logistics
• 4/15 Military Commission Judge Mulls Probe of Defense Claim
• 4/15 U.S., NATO Remain Concerned About Situation in Ukraine
• 4/15 Face of Defense: Despite Jitters, Singer Joins Soldier Show
• 4/15 DOD Official Visits Personnel Accounting Command Facilities
• 4/15 Battaglia Discusses Growth, Transition With Mayport Sailors
• 4/15 Airman Recalls Support After Brother's Marathon Bombing Injuries
• 4/14 DOD Unveils Improved Sexual Assault Prevention Training
• 4/14 9/11 Proceedings Go Into Recess Before Competency Hearing
• 4/14 Russian Aircraft Flies Near U.S. Navy Ship in Black Sea
• 4/14 Face of Defense: Army Infantryman is Proud to Serve
• 4/13 Hagel Speaks With New Egyptian Defense Minister
• 4/11 First Lady: New Initiatives Boost Military Caregiver Support
• 4/11 DOD Official: Russia's Actions Could Reshape Transatlantic Alliance
• 4/11 Fox, Sveinsson Discuss Ukraine, Arctic Security at Pentagon Meeting
• 4/11 More Amphibious Forces Needed in Pacific, General Says
• 4/11 Hagel, Mongolian Defense Minister Agree to Deepen Ties
• 4/11 DOD Spokesman Calls Hagel Asia Trip a Success
• 4/11 First, Second Ladies Urge Support for Military Caregivers
• 4/11 ESGR Selects Freedom Award Semifinalists
• 4/11 Navy Logistics Ship Joins Search for Airliner

Ads

ph.gif
ph.gif Top ph.gif

© 2008 SecurityInnovator. All rights reserved.