Bill Brenner

21 best free security tools

Mandiant's APT1: Revisited

The Mandiant APT1 report made our industry stronger by encouraging -- if not forcing -- information sharing. By Nick Selby

Attacks from China: A survival guide

Chinese cyberattack activity is back in the news this morning, with new details emerging on new attacks. Here's a collection of stories to help infosec pros better understand the threat.

#FFSec: Infosec pros who bring value to Twitter

#FFSec: Infosec pros who bring value to Twitter

Follow these names on Twitter. Together, they make cyberspace a more secure place. (copy and paste)

B-Sides Boston is Saturday

B-Sides Boston is Saturday

B-Sides has returned to Boston with a stellar keynote roster this weekend.

Leaving CSO, Heading to Akamai

Leaving CSO, Heading to Akamai

I wrote this in my personal blog yesterday, but am running it here as well for those who know my work exclusively through Salted Hash.

 WhiteHat Website Security Statistics Report

WhiteHat Website Security Statistics Report

The report represents more than 650 organizations and tens of thousands of real-world websites continually monitored by WhiteHat Sentinel Services.

Savage Chickens on information security

Savage Chickens on information security

Doug Savage nails it again.

ThreatMetrix's cautionary infographic on using Starbucks wi-fi

ThreatMetrix's cautionary infographic on using Starbucks wi-fi

A pretty good infographic on the dangers of working online from your local coffee shop.

Memorize this security equation, be set for life

This morning's amusement courtesy of Curt Craig, infosec manager at Hunt Consolidated, Inc. He used this slide at one of our recent events and sent it to me for sharing. I'm happy to pass it on.

Nuggets from Verizon's 2013 Data Breach Investigations Report

Nuggets from Verizon's 2013 Data Breach Investigations Report

Some takeaways from Verizon's latest data breach report.

Cisco sees possible exploit vector for DarkLeech compromises

Craig Williams, technical leader, threat research at Cisco, writes of another old, well-known flaw being exploited.

Load More