BYOD blues: What to do when employees leave – CSO Online – Security and Risk http://www.csoonline.com/article/735441/byod-blues-what-to-do-when-employees-leave?source=rss_data_protection
BYOD blues: What to do when employees leave – CSO Online – Security and Risk http://www.csoonline.com/article/735441/byod-blues-what-to-do-when-employees-leave?source=rss_data_protection
Securing access to AWS using MFA – Part I http://blogs.aws.amazon.com/security/post/Tx1KJ4H6H5R80UD/Securing-access-to-AWS-using-MFA-Part-I
Identify Backdoors in Firmware By Using Automatic String Analysis http://blog.ioactive.com/2013/05/identify-back-doors-in-firmware-by.html
Cracking 16 Character Strong passwords in less than an hour http://thehackernews.com/2013/05/cracking-16-character-strong-passwords.html
CrowdInspect Malware Forensic Program http://www.sectechno.com/2013/05/27/crowdinspect-malware-forensic-program/
PeStudio lets you analyse suspicious programs for malware http://betanews.com/2013/05/28/pestudio-lets-you-analyse-suspicious-programs-for-malware/
[cryptography] skype backdoor confirmation http://lists.randombit.net/pipermail/cryptography/2013-May/004224.html
Practical Review: Disaster Recovery (DR) in the AWS Cloud http://www.newvem.com/practical-review-disaster-recovery-dr-in-the-aws-cloud/
Ethical Hackers Talk Internet Terrorism, Anonymous, and DDoS Attacks http://www.vice.com/read/internet-terrorism-is-really-confusing