Proposed Legislation to Curb 1.3 million Demand for Subscriber Information in 2011

/
With the introduction of a newly drafted legislation by Representative Edward Markey, he is looking for a way to curb the growing number of requests wireless carriers receive from U.S. law enforcement agencies for their customers' phone records.

Large collection of Free Microsoft eBooks

/
Microsoft has released a large collection of Free Microsoft eBooks for you, including: SharePoint, Visual Studio, Windows Phone, Windows 8, Office 365, Office 2010, SQL Server 2012, Azure, and more.

2012 Washington D.C. Tech-Security Conference

/
This year, the Washington D.C. Tech-Security Conference will bring together private industry, government decision makers and technical enthusiasts in the fields of Information & Network Security. This unique conference format will provide several interactive high intensity sessions as well as tremendous networking opportunities.

Dropbox confirms it was hacked, offers users help

/
After a two-week investigation, the online file storage service confirms that usernames and passwords were stolen from third party Web sites and then used to access Dropbox accounts.

EC-Council University Offering Ethical Hacking Scholarship

/
EC-Council University (ECCU) is offering a full scholarship for its Master of Security Science (MSS) Program. The MSS prepares students for leadership positions in the cyber security industry. A 36-hour program, the course work can be completed online in as little as two years. Specifically the program offers in-depth instruction in the areas of ethical hacking, network security, digital forensics, disaster recovery, organizational structure and behavior, leadership and communication.

Comparing enterprise data anonymization techniques

/
There comes a time when data needs to be shared -- whether to evaluate a matter for research purposes, to test the functionality of a new application, or for an infinite number of other business purposes. To protect sensitivity or confidentiality of shared data, it often needs to be sanitized before it can be distributed and analyzed.

Register for Hacker Halted and get a FREE iPad3

/
Register for Hacker Halted and get a FREE iPad3

SANS Capital Region 2012 & SANS CyberCon 2012

/
Simply register for any SANS course using the following discount code: SecOrb_Connect ($150 off any SANS course in any format)

SANS Network Security 2012 – Caesars Palace – Las Vegas, NV – Sept 16 – 24

/
Register for any applicable SANS Network Security 2012 full course and receive a free OnDemand bundle. Please use promo code SecOrb_NS12OD when registering to receive the SANS OnDemand bundle for free.

SC eSymposium: SIEM

/
Security information and event management (SIEM) systems are a critical part of any organization's defense. By correlating and giving meaning to data from any number of tools -- from intrusion detection systems and firewalls to web logs or flow data -- SIEMs allow security teams to understand what's happening on their networks. However, they can be difficult to deploy and sometimes even harder to make work. We explore just how some companies find help from SIEMs and what organizations be mindful of as they look to deploy these.