@attritionorg @taosecurity just posted about that. http://taosecurity.blogspot.com/2012/09/top-ten-ways-to-stir-cyber-pot.html …
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@attritionorg responsible disclosureThanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@attritionorg any comparative evaluation of the security of a set of products, ex: web browsers.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@attritionorg All of the above? E.g., exploits market, security surveys, cloud security, APT. ...to be continuedThanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@attritionorg What constitutes baseline security measures. More time spent finding dodges than implementing them.#crowdsourcingThanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
.
@attritionorg software liability; vulnerability discovery/disclosure; APT; PII "breaches"; all things mobile (for now)Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@attritionorg Any time making information or functionality difficult to find or understand is described as "security through obscurity"?Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@attritionorg APT, partially SIEM, av industry when they try to come up with a "new" heuristic and the like ^^Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@attritionorg s/PCI/compliance#BruCONThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.