- Product Management Ease of Use as a Competitive Advantage for Security Products
Security products historically prioritized features over usability. Vendors should prompt users as last resort, make intelligent decisions on users' behalf, and let products run unobtrusively—users...
- Cheat Sheets How to Use the Security Architecture Cheat Sheet for Internet Applications
- Tools Smells Like Phish: Symantec's Update Norton Internet Security Email
- Malware Analysis Free Toolkits for Automating Malware Analysis
Free toolkits for automating malware analysis include Truman framework for behavioral analysis, Minibis from CERT.at, Cuckoo sandbox, Zero Wine (Windows malware in WINE on Linux), Buster Sandbox...
- Privacy Security Possibilities for Continuous Wearable Video Capture
Wearable video devices like Looxcie ($199) enable continuous capture with security applications: witnessing crimes, recording physical security walkthroughs during pen tests, documenting incident...
- Cheat Sheets Security Architecture Cheat Sheet for Internet Applications
A cheat sheet for initial design and review of Internet application security architecture, covering four areas: business requirements (data classification, users, partners, regulations),...