Comsec Blog on Information Security

Sunday, December 25, 2011


Posted by Comsec Group at 1:39 PM

Sunday, December 18, 2011

Adobe plugs two zero-day flaws in Reader and Acrobat

Infosecurity - Adobe plugs two zero-day flaws in Reader and Acrobat
Posted by Comsec Group at 1:38 PM

13 Security Trends to Watch in 2012 -- CIO Update

13 Security Trends to Watch in 2012 -- CIO Update
Posted by Comsec Group at 8:38 AM

Smartphone Secure Development Guidelines for App Developers

"Smartphone Secure Development Guidelines for App Developers", a collaboration between ENISA and OWASP.

The references at the end of the paper are also helpful.
https://docs.google.com/viewer?a=v&q=cache:LqRnkPEsiMcJ:www.enisa.europa.eu/act/application-security/smartphone-security-1/smartphone-secure-development-guidelines/at_download/fullReport+Smartphone+Secure+Development+Guidelines+for+App+Developers&hl=iw&gl=il&pid=bl&srcid=ADGEESh576JXnkLatRl7Kvpc1D4jgnNJpKR9xWnwx-OZg_SXScxhELVncjtAQQdG7HELNez6Qqv8Ra35_Utof1H9tw2Mvw87DljtXKpNrxmb1Ej5o7bKDC1lgZKQmXkf1s4M-y8ZrZil&sig=AHIEtbRG27ax3ZA_4ZMrB0oPvL3CHmEVcQ

Posted by Comsec Group at 7:58 AM

Thursday, December 15, 2011

A nice article about tokenization methods


and preventing discrepancies and inconsistencies between token generating servers that backup one another. 
the article gives some insight about the relative importance (in some scenarios) of using a deterministic method for generating tokens.
http://networkedblogs.com/rqMv7


Posted by Comsec Group at 8:48 AM
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Comsec Group Blog

Comsec Group, founded in 1987, is a pioneering market leader, providing all-inclusive Cyber and Information Security services to clients around the globe. Our mission is to serve our clients as trusted advisors, by securing their information and operational assets, ensuring the achievement of their business goals.

Share This

Tweet

Contributors

  • Comsec Group
  • Josh Grossman
  • Revitall
  • Stribog
  • Unknown
  • rbg

Search This Blog

Blog Archive

  • ►  2018 (9)
    • ►  November (1)
    • ►  October (2)
    • ►  September (2)
    • ►  August (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2017 (44)
    • ►  November (3)
    • ►  September (2)
    • ►  August (1)
    • ►  July (4)
    • ►  June (4)
    • ►  May (3)
    • ►  April (8)
    • ►  March (9)
    • ►  February (5)
    • ►  January (5)
  • ►  2016 (9)
    • ►  December (4)
    • ►  November (2)
    • ►  October (1)
    • ►  August (1)
    • ►  February (1)
  • ►  2015 (3)
    • ►  September (1)
    • ►  August (1)
    • ►  July (1)
  • ►  2014 (4)
    • ►  December (1)
    • ►  February (3)
  • ►  2013 (22)
    • ►  December (1)
    • ►  October (3)
    • ►  September (4)
    • ►  August (3)
    • ►  July (2)
    • ►  June (5)
    • ►  May (3)
    • ►  April (1)
  • ►  2012 (27)
    • ►  December (1)
    • ►  November (1)
    • ►  October (2)
    • ►  September (2)
    • ►  August (2)
    • ►  June (5)
    • ►  May (1)
    • ►  April (2)
    • ►  March (1)
    • ►  February (2)
    • ►  January (8)
  • ▼  2011 (22)
    • ▼  December (5)
      • Adobe plugs two zero-day flaws in Reader and Acrobat
      • 13 Security Trends to Watch in 2012 -- CIO Update
      • Smartphone Secure Development Guidelines for App D...
      • A nice article about tokenization methods
    • ►  November (8)
    • ►  October (3)
    • ►  September (1)
    • ►  August (2)
    • ►  July (2)
    • ►  February (1)
  • ►  2010 (23)
    • ►  November (2)
    • ►  September (1)
    • ►  August (1)
    • ►  July (2)
    • ►  June (6)
    • ►  May (1)
    • ►  April (2)
    • ►  March (2)
    • ►  February (1)
    • ►  January (5)

Labels

Adobe Acrobat (1) application (1) Application Security (7) authentification (1) Banking (1) biometrics (1) Cloud Computing (2) Cloud Security (2) Codefend (2) ComTech (2) Cost Management (1) Crimeware (1) Cybercrime (3) CyberUpdates (30) Data Leakage Prevention (DLP) (2) Data Protection (2) Data Security (3) distruption (1) Embezzlement (1) Employment Opportunities (1) ERP Security (1) FIFA (1) Finance (2) Fraud (2) Fraud Detection and Prevention (1) Google (1) GRC (6) Hackers (3) Hydraq (1) Information Protection and Control (IPC) (2) Information Security (3) InfoSec 2010 (1) Internal Auditors (1) Internet Explorer (2) israel (1) IT Costs (1) IT Security (2) Jobs (1) Josh Grossman (13) Live Stream (1) Malware (3) Mobile Phones (2) News (1) Organised Crime (2) OWASP (1) OWASP Top Ten (2) PA-DSS (2) PCI (3) PCI Compliance (3) PCI DSS (3) PCI:DSS (2) Product Focus (1) SAP Security (2) scanning (1) Secure Software Development Lifecycle (3) Security Code Analysis (1) Security Code Review (2) Security Threats (7) Social Networking (3) Software Security (2) Stuxnet (1) Trojan Horse (1) Virus (1) Vulnerabilities (2) Web 2.0 (1) Web Security (1) World Cup (1) Zero Day Attack (3)
Awesome Inc. theme. Powered by Blogger.