Already a member? Log in

Sign up with your...

or

Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share It With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

ADVERTISEMENT
ADVERTISEMENT

Links 1 through 10 of 510 Cory Edwards's Bookmarks

A recent data breach that exposed the Social Security numbers of more than 255,000 people in Utah highlights the longstanding but often underestimated risks posed to organizations by weak and default passwords.

Share It With Others!

A study done by HP shows that reported vulnerabilities in commercial software applications dropped dramatically last year compared with 2010 (6,843 disclosed vulnerabilities last year, down 19.5% from the year before, when 8,502 vulnerabilities in Internet-based systems, applications and other computing tools were identified).

Share It With Others!

A court case to determine what will happen to the more than 25 million gigabytes of data seized during the Mega Upload shutdown could have significant impact on cloud storage vendors.

Share It With Others!

Facebook’s recent purchase of Instagram is a clear sign that large companies and social platforms alike are moving to take full advantage of mobile platforms.

Share It With Others!

Top FBI officials are saying that cyberattacks are starting to eclipse terrorism as a threat to the country.

Share It With Others!

The division of Sony that suffered a cyberattack last year, has dropped Amazon Web Services for at least a portion of its cloud hosting and computing in favor of an OpenStack platform hosted by Rackspace.

Share It With Others!

A new report from Ponemon (sponsored by Trend Micro) shows that the most common cause of security breaches for small companies was empolyees’ loss of a laptop or other mobile data-bearing device.

Share It With Others!

According to data from Verizon’s 2012 Data Breach Investigation report more than 85 percent of the data breach incident response cases investigated by Verizon Business last year originated from a hack, and more than 90 percent of them came from the outside rather than via a malicious insider or business partner.

Share It With Others!

During the CSA summit at RSA the Cloud Security Alliance announced its latest initiatives, which include examining ways to better secure mobile devices through cloud computing, looking at ways to drive more security innovation, and a concerted push into the Asia-Pacific region.

Share It With Others!

Due to the many flaws in the current SSL and certificate authority (CA) trust model, various members of the security community have developed solutions to "fix" SSL - primarily by making adjustments to how public keys and certificates are created and processed in order to better secure users' Web experiences.

Share It With Others!

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT