Innovating The Next Big Thing October 26, 2014 ph.gif
ph.gif
Sections

Strategic Innovator: Journal of Strategic Innovation
Network & Information Security
Terrorism & Counterterrorism
Insurgency & Counterinsurgency
Weapons of Mass Destruction
Homeland Security & Defense
Energy, Infrastructure & Environment
Remembering 9/11
About

Next Innovator Group

TechnologyInnovator
• NextInnovator
EnterpriseInnovator
SecurityInnovator
DefenseInnovator
WirelessInnovator 
• HPinnovator
EnergyInnovator
TransportationInnovator  

Contact

• NextInnovator(at)Live.com

Writers Wanted

Writers Wanted

Feedjit Live Web Stats


Terror Alert Level


Homeland Security

Security Innovators

• The Clausewitz Home Page 
Small Wars Journal
Stratfor Geopolitical Weekly
Computerworld Security Blog
eWeek Security Blog
Information Security
Infoworld Zero Day Security
Cheap Hack: Larry Seltzer's New Blog
Security Insights Blog 
McAfee Audio Parasitics
McAfee Avert Labs Blog
Mike Rothman's Blog
Network Computing Daily Blog
NetworkWorld, Buzzblog
Security Fix, Brian Krebs
ZeroDay, Ryan Naraine
Rethinking Security

Next Innovators

Ghost City
Frontline Sentinel
• Innovation Insights
WebInno
Over the River
Enderle Group
Security Insights Blog 
McAfee Audio Parasitics
Rethinking Security
Ovum
iSuppli
Canalys
• eMarketer 
• CRM Help Desk SW 
Rethink Research
The Gadgeteer
Master the Moment

McAfee AudioParasitics


 
Books on Terrorism

Books on Network Security

Books on WMD

Barry's Books

 

Ads

ph.gif ph.gif
Network & Information Security McAfee Blogs: W32/Worm-AAEH Replaces Cryptor With One Used by Dofoil Downloaders
Jul 23, 2014 –  The W32/Worm-AAEH family (aliases: Beebone, VObfus, Changeup) of Trojans/downloaders/worms has been notorious for consistently morphing itself and switching control servers since June 2009. In June 2013, the AAEH worm made... Read the rest

McAfee Blogs: The Firewall is Turning 25, but is it Really All Grown Up?
Jul 23, 2014 –  When I turned 25, I saw this as a pretty big milestone in my life.  At 25 years old, I felt like a true adult – I was now all... Read the rest

McAfee Blogs: 10 Experts, One Topic, 800 Million AETs
Jul 21, 2014 –  To say cyber threats are getting more advanced may be the understatement of the year.  Every minute, our 500-plus team at McAfee Labs learns something new about the behavior of... Read the rest

McAfee Blogs: Texas Tech University HSC Unifies Security and Compliance with McAfee SIEM Solutions
Jul 16, 2014 –  Texas Tech University Health Sciences Center (TTUHSC) is a leader in education and research. With seven schools across six campuses, research facilities, and health care clinics, the university’s IT security... Read the rest

McAfee Blogs: Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities
Jul 15, 2014 –  Spear phishing email is a major worry to any organization. Messages that appear legitimate and specific fool us more often than random phishing attempts. Exploits that use patched vulnerabilities delivered... Read the rest

McAfee Blogs: Continuous Incident Response
Jul 15, 2014 –  At last week’s Gartner Risk and Security Management Summit, Anton Chuvakin mentioned that 1-3% of systems are compromised today. He called it “a low intensity fire, not a conflagration.” This seemed... Read the rest

McAfee Blogs: Dofoil Downloader Update Adds XOR-, RC4-Based Encryption
Jul 14, 2014 –  The Dofoil downloader (found in the wild since 2011) occasionally updates itself with new features and encryption techniques to hide communications with its control servers. The latest iteration uses a... Read the rest

Frontline Sentinel: The Impact of Red Team Drills
Jul 12, 2014 – Practice doesn’t make perfect it… it makes us better at something. If we’re not hardening our craft and finding our weaknesses we’re doomed to fail. This is why athletes put... Read the rest

Frontline Sentinel: Integrating Threat Intelligence Into Your Security Program
Jul 12, 2014 –  When it comes to securing your assets you need all the help you can get and it’s about time we realized that we’re not in this alone. Many other security... Read the rest

Frontline Sentinel: Creating a Secure Guest Network
Jul 12, 2014 –  It’s inevitable; someone from outside your organization is invited into your corporate headquarters, either for business reasons, professional services, sales etc. and needs to access the internet without one of... Read the rest

Frontline Sentinel: Onward Through the Cloud
Jul 12, 2014 – Over the past couple years anything with the word “cloud” in it has been selling big. It's been the ultimate buzzword in marketing and has completely clouded (pun intended) the... Read the rest

McAfee Blogs: More Choices for Encryption to Protect Your Data-At-Rest
Jul 8, 2014 –  A couple of months ago I participated in a Twitter Chat with IT World Canada which was fast, furious and a lot of fun. A few questions came up that I should... Read the rest

McAfee Blogs: CryptoWall Ransomware Built With RC4 Bricks
Jul 7, 2014 –  Last month many Internet users were suddenly forced to trade in Bitcoins. This was not for general purposes–they were paying to get their data back. Their systems had been hijacked... Read the rest

McAfee Blogs: Operation Dragonfly Imperils Industrial Protocol
Jul 2, 2014 –  Recent headlines (here and here) may have struck fear into those living near major energy installations due to references about the Stuxnet malware. In 2009, this particular strain of malware caused significant damage... Read the rest

McAfee Blogs: Don’t Settle for Less with Your IPS
Jul 2, 2014 –  What if you could deploy an intrusion prevention system (IPS) that has it all—robust protection, high performance, and low total cost of ownership (TCO)? Now you can. The 2014 NSS... Read the rest

McAfee Blogs: How Volusion Used McAfee SIEM to Meet New Security Needs
Jul 1, 2014 –  As a leader in e-commerce solutions, Volusion not only has to manage its own endpoints, but also those of its 40,000 customers worldwide. Online shopping is now a major aspect... Read the rest

McAfee Blogs: McAfee Named A Leader in Secure Web Gateways 2014 Magic Quadrant
Jun 27, 2014 –  On June 23, Gartner published its Secure Web Gateways Magic Quadrant, and positioned McAfee Web Protection in the Leaders Quadrant for the fifth year in a row. McAfee participates in eight... Read the rest

McAfee Blogs: Learn More About McAfee’s Next Generation Firewall Secret Weapon
Jun 26, 2014 –  We live in a dynamically changing threat environment, and Advanced Evasion Techniques (AETs) expose a fundamental design flaw in network security devices, despite vendors promising “100% protection.” Creating highly targeted... Read the rest

HP Security Products Blog: Disrupting the innovator’s dilemma
Jun 23, 2014 –  If you haven’t seen it, Jill Lepore, the Chair of Harvard’s History and Literature Program wrote an article that was published in The New Yorker. She disrupted just about everything her fellow Harvard colleague, Clayton Christensen wrote... Read the rest

McAfee Blogs: Multiparty authentication and cryptosystems in the IoT – part 3
Jun 23, 2014 –  Multi-party authentication and data protection Multi-party authentication and data protection can be expressed simply as  “2 +N”, meaning that “more than 2” entities are involved in a shared cryptosystem.  Additionally,... Read the rest

HP Security Products Blog: Can the law keep up with technology advances?
Jun 19, 2014 –  Way back in 2005, I wrote a blog post: Law and the Next Big Thing, where I asked the question: “Will Stare Decisis survive the next big thing?” Since the article I linked to... Read the rest

McAfee Blogs: Buyer Beware: This Smartphone Comes with Malware Pre-Loaded
Jun 19, 2014 –  The Star N9500 is, by all means, an inoffensive clone of a better-designed smartphone. Its body, and many of its features, are seemingly lifted from Samsung’s Galaxy S4 smartphone. It... Read the rest

McAfee Blogs: Multiparty authentication and cryptosystems in the IoT – part 2
Jun 19, 2014 –  Weak or expensive: the old cryptosystem and techniques don’t scale to the IoT There are basically two models for authentication of Internet relationships, one is weak (shared key) and one... Read the rest

McAfee Blogs: Hackers Score a Goal with World Cup Scams
Jun 18, 2014 –  Last Thursday, the world jumped into the World Cup—the premier celebration of soccer (or football, depending on where you call home). It’s an exciting time for sports fans, but it’s... Read the rest

McAfee Blogs: How The State of Colorado Secured its Infrastructure with McAfee SIEM
Jun 18, 2014 –  We at McAfee obviously believe that Enterprise Security Manager (ESM), our Security Information and Event Management (SIEM) solution, is a fantastic tool to help harden networks from cyber attacks. Corporations... Read the rest

McAfee Blogs: Bridging the Tech Gap: A Snapchat Primer for Parents
Jun 17, 2014 –  I will admit there are certain things I’ve given up trying to change as the parent of a teen. Like trying to get between my kids and their phones the... Read the rest

McAfee Blogs: Workplace Wearables and the Loss of Privacy
Jun 17, 2014 –  We’ve all had those late afternoon hunger pangs when it’s time to start fantasizing about going home and making dinner. Imagine if the watch you were wearing could actually find... Read the rest

McAfee Blogs: Thinking About Next-Generation Security and Cyberwarfare
Jun 17, 2014 –  Taking the cyberwar challenge seriously requires thinking outside our comfortable technology or national security boxes. Unfortunately—regardless of the lip service many decision makers pay to cybersecurity—this ability is a rare... Read the rest

HP Security Products Blog: Does personal accountability need to shift in business?
Jun 16, 2014 –  As business and IT continues to merge, we need to increase the vigilance and expectations of everyone. A recent article titled: Treat IT architecture as a weapon talks about how the US... Read the rest

McAfee Blogs: What is Fake Antivirus Software?
Jun 16, 2014 –  Most of you know how important it is to have security software on your computers to stay protected from viruses, malware, spam and other Internet threats. Unfortunately, cybercriminals also know that... Read the rest

Older articles »
Search SecurityInnovator

ph.gif ph.gif
Support This Site



Newest Articles

• 7/23 McAfee Blogs: W32/Worm-AAEH Replaces Cryptor With One Used by Dofoil Downloaders
• 7/23 McAfee Blogs: The Firewall is Turning 25, but is it Really All Grown Up?
• 7/22 RSIS Report: “The Six’s” Guiding Principles in Negotiating with Iran
• 7/21 McAfee Blogs: 10 Experts, One Topic, 800 Million AETs
• 7/16 McAfee Blogs: Texas Tech University HSC Unifies Security and Compliance with McAfee SIEM Solutions
• 7/15 McAfee Blogs: Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities
• 7/15 McAfee Blogs: Continuous Incident Response
• 7/14 McAfee Blogs: Dofoil Downloader Update Adds XOR-, RC4-Based Encryption
• 7/12 Frontline Sentinel: The Impact of Red Team Drills
• 7/12 Frontline Sentinel: Integrating Threat Intelligence Into Your Security Program
• 7/12 Frontline Sentinel: Creating a Secure Guest Network
• 7/12 Frontline Sentinel: Onward Through the Cloud
• 7/8 McAfee Blogs: More Choices for Encryption to Protect Your Data-At-Rest
• 7/7 McAfee Blogs: CryptoWall Ransomware Built With RC4 Bricks
• 7/2 McAfee Blogs: Operation Dragonfly Imperils Industrial Protocol
• 7/2 McAfee Blogs: Don’t Settle for Less with Your IPS
• 7/1 McAfee Blogs: How Volusion Used McAfee SIEM to Meet New Security Needs
• 6/27 McAfee Blogs: McAfee Named A Leader in Secure Web Gateways 2014 Magic Quadrant
• 6/26 McAfee Blogs: Learn More About McAfee’s Next Generation Firewall Secret Weapon
• 6/23 HP Security Products Blog: Disrupting the innovator’s dilemma
• 6/23 McAfee Blogs: Multiparty authentication and cryptosystems in the IoT – part 3
• 6/19 HP Security Products Blog: Can the law keep up with technology advances?
• 6/19 McAfee Blogs: Buyer Beware: This Smartphone Comes with Malware Pre-Loaded
• 6/19 McAfee Blogs: Multiparty authentication and cryptosystems in the IoT – part 2
• 6/18 McAfee Blogs: Hackers Score a Goal with World Cup Scams
• 6/18 McAfee Blogs: How The State of Colorado Secured its Infrastructure with McAfee SIEM
• 6/17 Connect News: 2014 Connect NonStop Availability Awards: Call for 2014 Entries
• 6/17 McAfee Blogs: Bridging the Tech Gap: A Snapchat Primer for Parents
• 6/17 McAfee Blogs: Workplace Wearables and the Loss of Privacy
• 6/17 McAfee Blogs: Thinking About Next-Generation Security and Cyberwarfare
• 6/16 HP Security Products Blog: Does personal accountability need to shift in business?
• 6/16 McAfee Blogs: What is Fake Antivirus Software?
• 6/13 CRS Report: U.S.-Vietnam Nuclear Cooperation Agreement: Issues for Congress
• 6/13 CRS Report: The Evolution of Cooperative Threat Reduction: Issues for Congress
• 6/11 McAfee Blogs: Celebrating our partners’ success
• 6/11 McAfee Blogs: Celebrating our partners’ success
• 6/11 McAfee Blogs: Microsoft Patch Tuesday: June 2014
• 6/9 RSIS Report: In Response to Gareth Porter’s Ridiculous Attack
• 6/9 HP Security Products Blog: What about 'the machine'?
• 6/9 HP Security Products Blog: Day 2 at Discover
• 6/9 McAfee Blogs: CISOs: What the New CSIS and McAfee Global Cost of Cybercrime Study Means for Your Business
• 6/5 McAfee Blogs: Teen Cyberbullying Triples, Emotional Impact Grows
• 6/5 McAfee Blogs: Apple Makes a Strong Push for the Internet of Things, But Will It be Secure?
• 6/4 HP Security Products Blog: Advanced analytics made easy with HAVEn
• 6/4 HP Security Products Blog: Viva Las Vegas! HP Enterprise Security Products represent at HP Discover 2014
• 6/4 McAfee Blogs: Massive Law Enforcement Operation Tells two Malware Variants it’s ‘Game Over’
• 6/4 McAfee Blogs: Backing Up the Claims: ESG Validates McAfee NGFW Strengths
• 6/3 RSIS Report: Five Compromises to Avoid in a Comprehensive Agreement with Iran
• 6/3 McAfee Blogs: The Privacy Problems with Mobile Messaging Apps
• 6/3 McAfee Blogs: Teens’ Online Behavior Can Get Them in Trouble

AddThis Feed Button

Barry's Books


Ads

ph.gif
ph.gif Top ph.gif

© 2008 SecurityInnovator. All rights reserved.