Innovating The Next Big Thing July 22, 2014 ph.gif
ph.gif
Sections

Strategic Innovator: Journal of Strategic Innovation
Network & Information Security
Terrorism & Counterterrorism
Insurgency & Counterinsurgency
Weapons of Mass Destruction
Homeland Security & Defense
Energy, Infrastructure & Environment
Remembering 9/11
About

Next Innovator Group

TechnologyInnovator
• NextInnovator
EnterpriseInnovator
SecurityInnovator
DefenseInnovator
WirelessInnovator 
• HPinnovator
EnergyInnovator
TransportationInnovator
SMBinnovator (beta)

Contact

• NextInnovator(at)Live.com

Writers Wanted

Writers Wanted

Feedjit Live Web Stats


Terror Alert Level


Homeland Security

Security Innovators

• The Clausewitz Home Page 
Small Wars Journal
Stratfor Geopolitical Weekly
Computerworld Security Blog
eWeek Security Blog
Information Security
Infoworld Zero Day Security
Cheap Hack: Larry Seltzer's New Blog
Security Insights Blog 
McAfee Audio Parasitics
McAfee Avert Labs Blog
Mike Rothman's Blog
Network Computing Daily Blog
NetworkWorld, Buzzblog
Security Fix, Brian Krebs
ZeroDay, Ryan Naraine
Rethinking Security

Next Innovators

Ghost City
Frontline Sentinel
• Innovation Insights
WebInno
Over the River
Enderle Group
Security Insights Blog 
McAfee Audio Parasitics
Rethinking Security
Ovum
iSuppli
Canalys
• eMarketer 
• CRM Help Desk SW 
Rethink Research
The Gadgeteer
Master the Moment

McAfee AudioParasitics


 
Books on Terrorism

Books on Network Security

Books on WMD

Barry's Books

 

Ads

ph.gif ph.gif
Network & Information Security HP Security Products Blog: Disrupting the innovator’s dilemma
Jun 23, 2014 –  If you haven’t seen it, Jill Lepore, the Chair of Harvard’s History and Literature Program wrote an article that was published in The New Yorker. She disrupted just about everything her fellow Harvard colleague, Clayton Christensen wrote... Read the rest

McAfee Blogs: Multiparty authentication and cryptosystems in the IoT – part 3
Jun 23, 2014 –  Multi-party authentication and data protection Multi-party authentication and data protection can be expressed simply as  “2 +N”, meaning that “more than 2” entities are involved in a shared cryptosystem.  Additionally,... Read the rest

HP Security Products Blog: Can the law keep up with technology advances?
Jun 19, 2014 –  Way back in 2005, I wrote a blog post: Law and the Next Big Thing, where I asked the question: “Will Stare Decisis survive the next big thing?” Since the article I linked to... Read the rest

McAfee Blogs: Buyer Beware: This Smartphone Comes with Malware Pre-Loaded
Jun 19, 2014 –  The Star N9500 is, by all means, an inoffensive clone of a better-designed smartphone. Its body, and many of its features, are seemingly lifted from Samsung’s Galaxy S4 smartphone. It... Read the rest

McAfee Blogs: Multiparty authentication and cryptosystems in the IoT – part 2
Jun 19, 2014 –  Weak or expensive: the old cryptosystem and techniques don’t scale to the IoT There are basically two models for authentication of Internet relationships, one is weak (shared key) and one... Read the rest

McAfee Blogs: Hackers Score a Goal with World Cup Scams
Jun 18, 2014 –  Last Thursday, the world jumped into the World Cup—the premier celebration of soccer (or football, depending on where you call home). It’s an exciting time for sports fans, but it’s... Read the rest

McAfee Blogs: How The State of Colorado Secured its Infrastructure with McAfee SIEM
Jun 18, 2014 –  We at McAfee obviously believe that Enterprise Security Manager (ESM), our Security Information and Event Management (SIEM) solution, is a fantastic tool to help harden networks from cyber attacks. Corporations... Read the rest

McAfee Blogs: Bridging the Tech Gap: A Snapchat Primer for Parents
Jun 17, 2014 –  I will admit there are certain things I’ve given up trying to change as the parent of a teen. Like trying to get between my kids and their phones the... Read the rest

McAfee Blogs: Workplace Wearables and the Loss of Privacy
Jun 17, 2014 –  We’ve all had those late afternoon hunger pangs when it’s time to start fantasizing about going home and making dinner. Imagine if the watch you were wearing could actually find... Read the rest

McAfee Blogs: Thinking About Next-Generation Security and Cyberwarfare
Jun 17, 2014 –  Taking the cyberwar challenge seriously requires thinking outside our comfortable technology or national security boxes. Unfortunately—regardless of the lip service many decision makers pay to cybersecurity—this ability is a rare... Read the rest

HP Security Products Blog: Does personal accountability need to shift in business?
Jun 16, 2014 –  As business and IT continues to merge, we need to increase the vigilance and expectations of everyone. A recent article titled: Treat IT architecture as a weapon talks about how the US... Read the rest

McAfee Blogs: What is Fake Antivirus Software?
Jun 16, 2014 –  Most of you know how important it is to have security software on your computers to stay protected from viruses, malware, spam and other Internet threats. Unfortunately, cybercriminals also know that... Read the rest

McAfee Blogs: Celebrating our partners’ success
Jun 11, 2014 –  Another year, another very successful Summit. Last month we greeted partners at our annual Channel Partner Summit in Marbella, Spain. This annual event is a chance for us to gather... Read the rest

McAfee Blogs: Celebrating our partners’ success
Jun 11, 2014 –  Another year, another very successful Summit. Last month we greeted partners at our annual Channel Partner Summit in Marbella, Spain. This annual event is a chance for us to gather... Read the rest

McAfee Blogs: Microsoft Patch Tuesday: June 2014
Jun 11, 2014 –  Hello Everyone, For the June edition of Patch Tuesday, we have been presented a new record with the largest number of individual vulnerabilities for a single bulletin. Though we have... Read the rest

HP Security Products Blog: What about 'the machine'?
Jun 9, 2014 –  I came across this Businessweek article: HP May Have Invented a New Kind of Computer – the Machine. This is all too early to be covered by an event like HP Discover, but still... Read the rest

HP Security Products Blog: Day 2 at Discover
Jun 9, 2014 –  There was a great deal of discussion in the keynote yesterday about ‘the machine’. It is likely being covered by the press quite a bit today, at least trying to... Read the rest

McAfee Blogs: CISOs: What the New CSIS and McAfee Global Cost of Cybercrime Study Means for Your Business
Jun 9, 2014 –  Want to give your executives a quantified picture of cybercrime risk? A new study by McAfee and CSIS (The Center for Strategic and International Studies) has put boundaries and rigorous... Read the rest

McAfee Blogs: Teen Cyberbullying Triples, Emotional Impact Grows
Jun 5, 2014 –  School has been out for about two weeks. That’s 14 days, 336 hours, 20,160 minutes. In that short time, Amanda, who is 15, has been on her mobile phone far... Read the rest

McAfee Blogs: Apple Makes a Strong Push for the Internet of Things, But Will It be Secure?
Jun 5, 2014 –  Apple held its annual Worldwide Developer’s Conference this past Monday. The conference saw a lot of new announcements, including a new version of OS X, iOS 8 and variety of... Read the rest

HP Security Products Blog: Advanced analytics made easy with HAVEn
Jun 4, 2014 –  Buried within the volumes of your data lies a treasure—just waiting to be found. But without a map or an “X” that marks the spot, how do you know where... Read the rest

HP Security Products Blog: Viva Las Vegas! HP Enterprise Security Products represent at HP Discover 2014
Jun 4, 2014 –  One of the great things about working for HP is the diversity of what we do. Simply put, we make a lot of stuff.  HP Discover gives us in the security industry... Read the rest

McAfee Blogs: Massive Law Enforcement Operation Tells two Malware Variants it’s ‘Game Over’
Jun 4, 2014 –  On Monday, the United States Department of Justice announced an international law enforcement effort to take out a massive botnet—a network of infected personal computers that work together to accomplish a task given... Read the rest

McAfee Blogs: Backing Up the Claims: ESG Validates McAfee NGFW Strengths
Jun 4, 2014 –  Some might say I’m biased.  I’m not.  I truly believe McAfee has the strongest performing Next Generation Firewall (NGFW) on the market.  In fact, I’ve bet on it.  Sure, you’ve... Read the rest

McAfee Blogs: The Privacy Problems with Mobile Messaging Apps
Jun 3, 2014 –  When you chat with someone through a third-party messaging app, be aware that someone may read it—someone other than your intended recipient. Much like a package left unattended on your... Read the rest

McAfee Blogs: Teens’ Online Behavior Can Get Them in Trouble
Jun 3, 2014 –  Do you really know what your kids are doing all the time? Probably not, unless you’re a stalker (just kidding). But really, there has to be some element of trust... Read the rest

McAfee Blogs: Deterrence in Cyberspace Helps Prevent Cyberwar
Jun 3, 2014 –  Deterrence is an important part of warfare, often the most effective form of defending. Therefore, in the next couple of years we expect to see states reveal some of their... Read the rest

HP Security Products Blog: Do data breaches influence investors?
Jun 2, 2014 –  There is no denying data breaches have serious consequences including penalties for disclosure violations and non-compliance, and a host of other things like ‘brand damage’ that are harder to quantify.... Read the rest

McAfee Blogs: It’s ‘Game Over’ for Zeus and CryptoLocker
Jun 2, 2014 –  Under Operation Tovar, global law enforcement—in conjunction with the private sector and McAfee—has launched an action to dismantle the Gameover Zeus and CryptoLocker infrastructure. Disrupting the criminal infrastructure by taking... Read the rest

HP Security Products Blog: SIEM is NOT dead, SIEM means never having to say 'sorry'
May 30, 2014 –  SIEM is NOT dead, SIEM means never having to say 'sorry'. We have been leading the market, technology, and industry for as long as SIEM existed. We have been recognized... Read the rest

Older articles »
Search SecurityInnovator

ph.gif ph.gif
Support This Site



Newest Articles

• 6/23 HP Security Products Blog: Disrupting the innovator’s dilemma
• 6/23 McAfee Blogs: Multiparty authentication and cryptosystems in the IoT – part 3
• 6/19 HP Security Products Blog: Can the law keep up with technology advances?
• 6/19 McAfee Blogs: Buyer Beware: This Smartphone Comes with Malware Pre-Loaded
• 6/19 McAfee Blogs: Multiparty authentication and cryptosystems in the IoT – part 2
• 6/18 McAfee Blogs: Hackers Score a Goal with World Cup Scams
• 6/18 McAfee Blogs: How The State of Colorado Secured its Infrastructure with McAfee SIEM
• 6/17 McAfee Blogs: Bridging the Tech Gap: A Snapchat Primer for Parents
• 6/17 McAfee Blogs: Workplace Wearables and the Loss of Privacy
• 6/17 McAfee Blogs: Thinking About Next-Generation Security and Cyberwarfare
• 6/16 HP Security Products Blog: Does personal accountability need to shift in business?
• 6/16 McAfee Blogs: What is Fake Antivirus Software?
• 6/13 CRS Report: U.S.-Vietnam Nuclear Cooperation Agreement: Issues for Congress
• 6/13 CRS Report: The Evolution of Cooperative Threat Reduction: Issues for Congress
• 6/11 McAfee Blogs: Celebrating our partners’ success
• 6/11 McAfee Blogs: Celebrating our partners’ success
• 6/11 McAfee Blogs: Microsoft Patch Tuesday: June 2014
• 6/9 RSIS Report: In Response to Gareth Porter’s Ridiculous Attack
• 6/9 HP Security Products Blog: What about 'the machine'?
• 6/9 HP Security Products Blog: Day 2 at Discover
• 6/9 McAfee Blogs: CISOs: What the New CSIS and McAfee Global Cost of Cybercrime Study Means for Your Business
• 6/5 McAfee Blogs: Teen Cyberbullying Triples, Emotional Impact Grows
• 6/5 McAfee Blogs: Apple Makes a Strong Push for the Internet of Things, But Will It be Secure?
• 6/4 HP Security Products Blog: Advanced analytics made easy with HAVEn
• 6/4 HP Security Products Blog: Viva Las Vegas! HP Enterprise Security Products represent at HP Discover 2014
• 6/4 McAfee Blogs: Massive Law Enforcement Operation Tells two Malware Variants it’s ‘Game Over’
• 6/4 McAfee Blogs: Backing Up the Claims: ESG Validates McAfee NGFW Strengths
• 6/3 RSIS Report: Five Compromises to Avoid in a Comprehensive Agreement with Iran
• 6/3 McAfee Blogs: The Privacy Problems with Mobile Messaging Apps
• 6/3 McAfee Blogs: Teens’ Online Behavior Can Get Them in Trouble
• 6/3 McAfee Blogs: Deterrence in Cyberspace Helps Prevent Cyberwar
• 6/2 HP Security Products Blog: Do data breaches influence investors?
• 6/2 McAfee Blogs: It’s ‘Game Over’ for Zeus and CryptoLocker
• 6/1 Review of Barry Scott Zellen's Fast-Changing Arctic in the Journal of Arctic, Antarctic, and Alpine Research
• 6/1 Review of Barry Scott Zellen's State of Recovery in the Journal of Terrorism Research
• 5/30 HP Security Products Blog: SIEM is NOT dead, SIEM means never having to say 'sorry'
• 5/29 HP Security Products Blog: Big Data Security Analytics Part 6: 3 Keys to Success
• 5/29 HP Security Products Blog: Security for unstructured sensitive data
• 5/29 HP Security Products Blog: New survey shows cybercrime on the rise: HP TippingPoint is putting a stop to it.
• 5/29 HP Security Products Blog: Getting started with FREE trial version of HP ArcSight Logger
• 5/29 McAfee Blogs: Endpoint Security, Part 5 of 5: A/V Alone is Not Enough
• 5/29 McAfee Blogs: Cyber Security for Small Business: Dealing with Cryptolocker and RansomwareMcAfee Advanced Threat Defense Lures then Catches Spear Phishing Malware
• 5/29 McAfee Blogs: Multi-party authentication and cryptography in the IoT
• 5/28 HP Security Products Blog: DVToolkit and DVConverter – Leveraging Custom Filter Detection in Your Network
• 5/28 McAfee Blogs: SIEM Basics Change as Fast as Malware – Get up to Speed with Securosis and McAfee
• 5/27 RSIS Report: Spin, Spin, Spin – Rev. 1
• 5/27 HP Security Products Blog: The HP TippingPoint protection lifecycle
• 5/27 HP Security Products Blog: HP Software announces: Discover 2014 Awards of Excellence – Enterprise Security Winners
• 5/27 HP Security Products Blog: What's new with HP ArcSight Logger 5.5? It is the fastest Logger ever!

AddThis Feed Button

Barry's Books


DefenseLink

• 7/22 Multinational Exercise to Test Special Operations Forces
• 7/22 TRICARE Nurse Advice Line Offers Health Care Guidance
• 7/22 Guardsmen Help to Battle Northwest Blazes
• 7/22 Hagel, Australian Foreign Minister Discuss Airliner Tragedy
• 7/22 Hagel Offers Condolences to Egyptian Defense Minister
• 7/22 Face of Defense: Airman Sews to Keep Aircrews Safe
• 7/22 Vice President Shares Admiration for 9/11 Generation
• 7/22 President Awards Medal of Honor to Former Army Staff Sergeant
• 7/21 Obama Calls for Cooperation to Investigate Airliner Downing
• 7/21 DoD Identifies Missing World War II Marine
• 7/21 USU Fellow Puts New Face on Dental Medicine
• 7/21 D.C. Quarters Re-named to Honor Fleet Admiral William Leahy
• 7/21 Face of Defense: Airmen Deliver Morale-boosting Mail
• 7/19 Hagel Congratulates South Korea's New Defense Minister
• 7/19 Hagel Expresses Condolences to Dutch Defense Minister
• 7/18 Cape Ray Continues Neutralizing Syrian Chemical Materials
• 7/18 DoD Spokesman: No Hint Russia Has Ceased Rebel Support
• 7/18 Investigators Need Time, Access, Pentagon Spokesman Says
• 7/18 'Final Rule' Offers Broader Mental Health Care Coverage
• 7/18 Obama: Malaysian Airliner Shot Down, American Killed
• 7/18 Hagel Offers Condolences to Malaysian Defense Minister
• 7/18 Face of Defense: Martial Arts Instructor Teaches With Passion
• 7/17 Hagel Congratulates New British Defense Secretary
• 7/17 'Whistleblower Law' Gains Momentum
• 7/17 Afghanistan Dominates Dunford's Confirmation Hearing
• 7/17 Cyber Guard Exercise Tests People, Partnerships
• 7/17 U.S. Officials: Russia Increasing Support for Ukraine Rebels
• 7/17 DoD, DoJ Improve Sexual Assault Response Advocate Training
• 7/17 Face of Defense: Marine Completes 90-pound Weight Loss
• 7/16 First Lady Lauds Los Angeles Mayor's Homeless Vets Initiative

Ads

ph.gif
ph.gif Top ph.gif

© 2008 SecurityInnovator. All rights reserved.