Webcast: Code Red to Zbot: 10 Years of Tech, Researchers and Threat Evolution

For those of you that joined us at RSA this year in San Francisco, you may have taking in the session presented by Jeff Jones and Tim Rains on 10 Years of Tech, Researchers and Threat Evolution. Jeff and Tim followed up with a series of blog posts delving in to more detail: Trustworthy Computing:…

0

The Road to CSUN

Okay, I admit it… I had no real idea going in to a conversation today what the CSUN conference was. It turns out that I am referring to the Technology & Persons with Disabilities Conference. The road to it is another question… The team (Trustworthy Computing) that I sit in includes a range of different…

0

Microsoft PhotoDNA Technology Helping Law Enforcement Fight Child Pornography

Having worked with Law Enforcement around the world for many years, there is always a huge demand for tools and resources to help investigations. One such tool is PhotoDNA, which essentially creates something like a fingerprint of an image which can be compared with the signatures of other images to find copies. The National Center…

0

Mouse Without Borders and Windows 8 Consumer Preview

I have blogged about using Mouse Without Borders before, but today after installing the Windows 8 Consumer Preview on my system I wanted to see if I could get Magic Mouse running. While the computer I installed it on has a basic touch screen, I wanted to put a mouse and keyboard on the device,…

4

Creating a Windows 8 Bootable USB flash drive

Now I am back from the RSA Conference, I have a few moments to put the Windows 8 Consumer Preview on my ASUS EEE Top machine. The fastest way for me to do this considering the machine does not have a DVD drive is to create a bootable USB flash drive with the Windows 8…

4

Trust in Computing Research

Yesterday in Scott Charney’s RSA 2012 keynote, he made reference to a statistic stating that 92.5 percent of respondents believe cybercrime laws need updating. This was one of the many findings of the Trust in Computing research recently conducted by the Trustworthy Computing team. The Microsoft “Trust in Computing” research was conducted in nine countries…

0

RSA Conference 2012

Whether you here at the RSA Conference 2012 in San Francisco, CA or not, you might be interested to know that the keynote Scott Charney delivered this morning is now online. Scott Charney’s RSA keynote this morning outlined evolved security, privacy and reliability strategies for cloud and big data. He encouraged industry and governments to…

0

Cloud Security Alliance Summit 2012

For those of you who were unable to join in this morning at the Cloud Security Alliance Summit 2012, you missed an interesting event. The summit was a mixture of keynotes and panels from folks across the industry. Details can be found here: https://cloudsecurityalliance.org/events/csa-summit-rsa-2012/ "Protecting State Secrets in the Cloud" Mike McConnell, Vice Chairman, Booz…

0

A Truly Magic Mouse

I have now been using the application for a little over a week and I can honestly say that it has changed my geekish life. What is it you ask? Well, quite simply put it is a mouse without borders… Do you have multiple computers on your desk, or wish you could easily without having…

0