If you're a member of the Information Security community, you're probably already aware of the breach that occured to RSA Security with regards to their SecureID Token two-factor authentication solution is used by millions including government and private sector organizations.
Over the weekend, I started to integrate my website EdwardFrye.com into social media sites and added icons to the site so you can find me on those social media sites like Twitter, Facebook, LinkedIn, etc.
Now I have enabled my website so you can sign into it using your Twitter or Facebook account to post comments directly on my site if you want.
Enterprise Information Security Professional
Proven information security leader with over 19 years success in guiding implementation of leading-edge technology solutions that drive business growth in network, systems architecture...
Working on the Cornerstones of Trust website. Last year this conference was a great success and I'm looking forward to it again this year. Remember that this year it falls on June 29th. Hope to see you there.
So I was watching my Tweetdeck the other day, and Richard tweeted his new blog post about "Real Security Is Threat-Centric" and it got me thinking. The thought that jumped into my head right off was "he may have a point", but then I thought, 'wait, that doesn't even apply in the "real world"'.
Spent the day at the Cornerstones of Trust Security Conference today in Foster City. Spent the day on the technology track.
In this track, they discussed Virtualization and Cloud Computing and the security implications of using cloud computing. I found the information regarding some of the new VMware security products that have been announced very interesting, now these were not VMware vendor discussions but rather the points of view of a technologies who is in the process of implementing them and following their products.
Come out and meet fellow security people from all over the Bay Area. As always, this is not a sponsored meeting, there is no agenda or speakers, and no RSVP is needed
Stealing the entire text