Where security pros grow

My peers are my analyst

Discuss security topics

Ask a question, post a resource, discuss news

Connect with experts

Find pros for thousand of expertise tags

Boost your reputation

Great posts increase your rank for security expertise

Sign Up

Join the biggest security community

Limor Elbaz

Oh No! Microsoft buys Linkedin

Microsoft‍ buys Linkedin‍ this morning in a gigantic $26.2 billion all cash deal: http://www.cnbc.com/2016/06/13/microsoft-to-buy-linkedin.html Does it make sense for Microsoft? Absolutely. Microsoft now gets to connect applications, businesses and people. That's huge. Microsoft can leverage the data that Linkedin has to promote their solutions, but also finally sell to people,… Read more
19
Write a comment...

Ulrich Rosenbaum

Ulrich Rosenbaum

Wanted to share with you this screenshot from my Ad Blocker on LI:I just remarked this high score ;-) 24 requests blocked when accessing LI...

Esfandiar Behrouz

Esfandiar Behrouz

Interesting perspective. Thank you for sharing your thoughts. Every corporation or business entity uses information directly or indirectly to make money. If this is to say we should be mindful of the monopoly in action, I agree.This type of inform... Read more

3
Christopher Gebhardt

New Breach: Scrum.org

FYI: We value you as a customer of Scrum.org and respect the Privacy of your information. This is why, as a precautionary measure, we are writing to let you know about a security incident which involves your personal information. This notice has not been delayed due to a law enforcement investigation.What Happened?On May 26, 2016, we noticed an issue with the Scrum.org website outgoi… Read more
3
Write a comment...

Arda Özkal

Arda Özkal

You should send the list of user mails to haveibeenpwned.com if your privacy policy allows sharing user data with third parties.

1

Nic Cancellari

Nic Cancellari

This is ugly: the password decryption keySo not the way to do password security! The provider that scrum.org was using actually did this. I -almost- can't believe it. And then stored the passwords on the same system / network.

Peerlyst
White Hat Hacker Eavesdropped on Canadian Political Party

White Hat Hacker Eavesdropped on Canadian Political Party

Many hackers have an interest in accessing politically sensitive information. But their motivations for doing so vary significantly. Take Guccifer 2.0. Earlier in June, the alleged hacker claimed responsibility for a breach at the Democratic National Convention (DNC).

Write a comment...
Limor Elbaz

Help us write the book on security careers!

Peerlyst aims to give InfoSec pros the insight and tools they need to succeed in their jobs, so we’re super-excited about our latest project: The Beginner’s Guide to an Information Security Career, which we’ll offer as a free Kindle book. Right now it’s just a gleam in our eye, but with your help, it will be an invaluable crowdsourced resource on starting—and bu… Read more
8
36
Write a comment...

Antonio Stano

Antonio Stano

Hi Limor,i am interested in contributing please contact me.Many thanks,

2

Sophia Tupolev

Sophia Tupolev

Getting Started in Information Security from Dennis Maldonado

3
Peerlyst
How Would You Detect and Impede Ransomware on an Endpoint?

How Would You Detect and Impede Ransomware on an Endpoint?

Malware that encrypts and holds files at ransom can have devastating effects on personal documents, customer data and business operations. If you were designing software that could detect and impede such ransomware, what techniques would you use to safeguard the endpoint?

1
Write a comment...
Peerlyst
Your nearest and dearest are snooping on your phone - Help Net Security

Your nearest and dearest are snooping on your phone - Help Net Security

If you needed one more reason for protecting your phone with a passcode or fingerprint, here it is: there's a good chance that one or more of the people close to you have snooped on it in the last year.

Write a comment...