-
-
RSA大会播报 – 2014最佳安全博客提名(国外篇)
-
发表于: 2014-2-20 14:48 618
-
来源:11fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3k6J5k6h3g2T1N6h3k6Q4x3X3g2U0L8$3#2Q4x3V1j5`.
今年美国RSA大会将在这个月的23-28号举行,每年大会上都会评出过去一年来业内最佳安全博客(Security Bloggers Network Social Security Awards 2014),该投票已于2月14日停止了投票,大奖得主将于RSA大会上公布。现在我们抢先看看都有哪些提名。(部分有重复,排名不分先后),最终结果且听下周分解。
最佳企业安全博客提名:
Juniper(网络厂商,不用多介绍):a89K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3k6G2M7Y4g2E0M7#2)9J5k6h3A6#2L8X3W2H3k6i4u0Q4x3X3g2F1k6i4c8Q4x3V1k6@1y4g2)9J5c8W2y4W2j5%4g2J5K9i4c8&6i4K6u0V1e0h3!0T1K9h3I4A6N6s2W2Q4x3X3c8z5L8%4N6Q4x3V1k6T1k6#2)9J5k6s2m8Q4x3V1k6F1k6i4c8%4L8%4u0C8K9h3&6Y4L8X3!0%4
Norse(提供前摄性的安全解决方案,基于dark intelligence平台防御当局高级威胁:3e0K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3&6G2M7Y4y4W2i4K6u0V1j5$3!0J5M7q4)9J5k6h3y4G2L8g2)9J5c8X3u0D9L8$3N6Q4x3X3c8A6L8X3c8W2P5q4)9J5k6h3S2@1L8h3H3`.
RedSeal Networks(安全管理解决方案): 660K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6Q4x3X3g2J5k6h3c8K6k6h3q4D9L8X3g2@1N6$3!0J5K9%4y4Q4x3X3g2U0L8$3#2Q4x3V1j5`.
Solutionary Minds: afcK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4G2L8s2g2@1K9h3!0F1j5i4u0&6i4K6u0W2j5$3!0E0i4K6u0r3M7X3g2K6L8%4g2J5j5$3g2Q4x3X3c8U0k6h3&6@1k6i4u0Q4x3V1k6T1L8r3!0Y4i4K6u0r3
VioPoint(提供MSS服务): eb3K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4k6A6L8%4m8G2K9h3&6@1i4K6u0W2j5$3!0E0i4K6u0r3j5X3I4G2k6#2)9J5c8R3`.`.
WhiteHat Security: bdbK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1L8r3!0Y4i4K6u0W2N6$3S2A6N6r3g2Z5j5i4c8K6k6h3y4Q4x3X3g2U0L8$3@1`.
TripWire: The State of Security: 47aK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4c8J5K9i4m8%4K9i4u0W2i4K6u0W2j5$3!0E0i4K6u0r3M7%4c8S2N6r3g2Q4x3X3c8G2k6W2)9J5k6s2y4W2j5%4g2J5K9i4c8&6i4K6u0r3
Veracode Blog(基于云的软件安全供应商): 5fbK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4k6W2M7X3q4U0L8$3c8W2i4K6u0W2j5$3!0E0i4K6u0r3j5X3I4G2k6#2)9J5c8R3`.`.
Mandiant M-unition: 5d3K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2E0j5h3&6V1K9h3q4F1N6q4)9J5k6h3y4G2L8g2)9J5c8X3u0D9L8$3N6Q4x3V1j5`.
Fortinet Blog(UTM,NGFW…): 59aK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6Q4x3X3g2X3L8%4u0@1K9h3&6W2N6q4)9J5k6h3y4G2L8g2)9J5c8R3`.`.
F-Secure Blog: c9fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3k6Q4x3X3c8K6k6h3y4#2M7X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6%4k6h3u0D9L8$3N6Q4x3V1j5`.
Trend Micro Security Intelligence Blog(趋势科技): 5b6K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6Q4x3X3g2@1M7X3g2F1k6r3#2A6j5%4u0G2i4K6u0W2j5$3!0E0i4K6u0r3N6s2u0W2L8X3c8D9j5h3u0K6i4K6u0V1M7$3g2U0N6i4u0A6N6s2W2Q4x3X3c8A6L8Y4c8W2L8r3I4A6k6$3g2F1j5$3g2Q4x3V1j5`.
Kaspersky Lab Securelist(卡巴斯基): 293K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4W2j5%4g2J5k6h3I4A6M7%4c8Q4x3X3g2U0L8$3#2Q4x3V1k6W2L8W2)9J5c8X3u0D9L8$3M7`.
Akamai Blog(云平台,CDN…): 6eeK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1L8r3!0Y4M7#2)9J5k6h3q4C8j5h3#2S2K9g2)9J5k6h3y4G2L8g2)9J5c8Y4y4W2j5%4g2J5K9i4c8&6i4K6u0r3
Bit9(白名单软件机制管理厂商): f6eK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1L8r3!0Y4i4K6u0W2j5X3W2@1z5g2)9J5k6h3y4G2L8g2)9J5c8R3`.`.
IOActive(安全评估公司): 2d3K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6Q4x3X3g2A6L8$3q4U0N6r3W2$3k6g2)9J5k6h3y4G2L8g2)9J5c8R3`.`.
最佳安全播客提名:
SANS 的ISC每日播报 Stormcast: 377K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6A6M7$3y4Q4x3X3g2K6j5h3&6K6i4K6u0W2k6h3c8#2i4K6u0r3M7r3!0V1j5$3q4K6N6q4)9J5k6h3S2@1L8h3H3`.
MiSec, OWASP Detroit, BSides Detroit的播客: 2f0K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4m8G2k6r3y4S2M7%4c8Q4x3X3g2E0K9h3y4Z5M7$3g2U0i4K6u0W2L8%4u0Y4i4K6u0r3
Security Slice: c68K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4c8J5K9i4m8%4K9i4u0W2i4K6u0W2j5$3!0E0i4K6u0r3M7%4c8S2N6r3g2Q4x3X3c8G2k6W2)9J5k6s2y4W2j5%4g2J5K9i4c8&6i4K6u0r3N6r3!0H3K9h3y4K6i4K6u0r3M7$3g2U0N6i4u0A6N6s2W2Q4x3X3c8K6L8r3W2U0k6g2)9J5k6s2m8G2k6r3y4S2M7%4c8Q4x3V1j5`.
Threat Post: af6K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2@1K9s2u0W2j5i4c8H3L8%4y4@1i4K6u0W2j5$3!0E0
Security Ledger: 5f5K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6k6h3y4#2M7X3W2@1P5h3I4W2k6r3N6W2M7W2)9J5k6h3y4G2L8g2)9J5c8X3y4S2N6r3g2Y4L8%4u0&6i4K6u0r3M7r3!0V1j5$3q4K6N6s2y4Q4x3V1j5`.
The Risk Science Podcast: dceK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0A6M7$3E0K6j5$3W2W2L8X3y4W2i4K6u0W2L8X3g2@1i4K6u0r3
SecurityWeekly: 158K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4m8S2N6h3I4V1L8%4c8U0L8$3#2Q4x3X3g2U0L8$3#2Q4x3V1j5`.
Securosis, Firestarter: 7c8K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6k6h3y4#2M7X3!0K6K9i4y4Q4x3X3g2U0L8$3#2Q4x3V1k6T1L8r3!0Y4i4K6u0r3k6X3W2J5k6i4y4@1j5i4u0@1k6i4u0Q4x3X3c8@1K9r3g2Q4x3X3c8F1M7$3q4Q4x3X3c8S2L8X3c8Q4x3X3c8J5M7$3p5`.
最佳教育安全博客提名:
RedSeal Networks: 437K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6Q4x3X3g2J5k6h3c8K6k6h3q4D9L8X3g2@1N6$3!0J5K9%4y4Q4x3X3g2U0L8$3#2Q4x3V1j5`.
Terebrate: 9fbK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4c8W2M7X3g2T1M7X3q4@1k6g2)9J5k6h3u0D9L8$3N6K6M7r3!0@1i4K6u0W2j5$3!0E0i4K6u0r3
EFF’s Deep Links: 7eaK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2W2k6X3k6Q4x3X3g2G2M7X3N6Q4x3V1k6V1k6h3g2H3L8r3W2F1K9%4x3`.
Security Bistro: ed6K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4W2j5%4g2J5K9i4c8&6j5X3W2K6N6s2u0G2i4K6u0W2j5$3!0E0i4K6u0r3
Graham Cluley: acbK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3N6J5j5h3S2S2L8h3y4D9N6h3I4W2P5g2)9J5k6h3y4G2L8g2)9J5c8R3`.`.
Krebs on security: 181K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3E0J5k6h3u0K6L8$3&6K6k6h3y4#2M7X3W2@1P5g2)9J5k6h3y4G2L8g2)9J5c8W2)9J5y4X3&6T1M7%4m8Q4x3@1u0Q4c8e0g2Q4z5p5k6Q4b7f1k6Q4c8e0g2Q4z5p5k6Q4z5o6u0Q4c8e0S2Q4z5o6m8Q4z5o6y4Q4c8e0S2Q4b7V1k6Q4z5e0q4Q4c8e0k6Q4z5f1y4Q4z5f1k6X3M7X3g2W2j5Y4g2X3i4@1f1@1i4@1t1^5i4K6S2m8i4@1f1%4i4K6W2m8i4K6R3@1i4@1f1@1i4@1u0m8i4@1u0m8i4@1f1%4i4K6R3&6i4@1p5&6i4@1f1@1i4@1t1^5i4K6V1K6i4@1f1^5i4@1q4q4i4@1u0r3i4@1f1K6i4K6R3H3i4K6S2m8i4@1f1@1i4@1u0m8i4@1u0m8i4@1f1%4i4K6R3&6i4@1p5&6i4@1g2r3i4@1u0o6i4K6W2m8i4@1f1@1i4@1u0n7i4K6V1$3i4@1f1$3i4K6V1^5i4@1q4r3i4@1f1@1i4@1u0m8i4K6V1J5i4@1f1^5i4K6R3I4i4K6V1@1i4@1f1%4i4@1u0p5i4K6V1I4i4@1f1@1i4@1t1^5i4K6V1$3i4@1f1%4i4K6V1#2i4K6S2o6i4@1f1%4i4K6W2m8i4K6R3@1i4@1f1%4i4@1p5%4i4K6R3I4i4@1f1#2i4@1q4q4i4@1t1$3i4@1f1@1i4@1u0q4i4@1p5$3i4@1f1$3i4K6S2q4i4@1p5J5i4@1f1K6i4K6R3H3i4K6S2n7i4K6t1$3L8X3u0K6M7q4)9K6b7R3`.`.
Identropy Blog: 615K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6Q4x3X3g2A6k6r3g2F1N6s2u0G2M7s2W2Q4x3X3g2U0L8$3#2Q4x3V1j5`.
Dell SecureWorks Security and Compliance Blog: 551K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4W2j5%4g2J5k6i4N6G2M7X3E0K6i4K6u0W2j5$3!0E0i4K6u0r3M7X3g2K6L8%4g2J5j5$3g2K6i4K6u0r3j5X3I4G2k6#2)9J5c8R3`.`.
Securosis: 74cK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6k6h3y4#2M7X3!0K6K9i4y4Q4x3X3g2U0L8$3#2Q4x3V1k6T1L8r3!0Y4
Solutionary Minds Blog: eb0K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4G2L8s2g2@1K9h3!0F1j5i4u0&6i4K6u0W2j5$3!0E0i4K6u0r3M7X3g2K6L8%4g2J5j5$3g2Q4x3X3c8U0k6h3&6@1k6i4u0Q4x3V1k6T1L8r3!0Y4i4K6u0r3
Rapid7 SecurityStreet: 71cK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6U0L8$3#2E0N6h3&6A6N6s2W2Q4x3X3g2J5j5i4m8A6k6o6N6Q4x3X3g2U0L8$3#2Q4x3V1k6U0L8$3&6@1k6h3&6@1i4K6t1K6k6X3W2D9N6r3g2J5d9f1c8Q4x3@1c8S2L8r3I4Q4y4@1g2G2j5X3A6W2j5%4c8@1P5i4m8W2i4K6N6q4L8$3u0B7k6h3y4@1N6s2W2H3k6g2)9#2b7X3u0D9L8$3N6H3L8%4y4@1i4K6g2p5
最佳娱乐安全博客提名
Krypt3ia: ce5K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3E0J5P5i4m8@1x3$3W2S2i4K6u0W2N6$3!0J5k6s2m8J5k6i4y4K6i4K6u0W2j5$3!0E0i4K6u0r3
Kevin Townsend: Security centric issues, news, rants – and other things: 575K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3E0W2N6Y4c8G2N6$3&6K6k6h3&6V1i4K6u0W2N6$3!0J5k6s2m8J5k6i4y4K6i4K6u0W2j5$3!0E0i4K6u0r3
Matt Blaze’s Exhaustive Search: 51aK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3y4J5P5i4m8@1L8#2)9J5k6h3y4G2L8g2)9J5c8X3u0D9L8$3M7`.
The New School of Information Security Blog: d2cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3&6W2N6%4y4U0K9r3!0G2L8s2y4W2j5%4g2J5K9i4c8&6i4K6u0W2j5$3!0E0i4K6u0r3
Uncommon Sense Security: 766K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6Q4x3X3g2#2L8X3y4G2L8h3#2G2L8Y4y4W2L8Y4y4W2M7$3g2U0N6i4u0A6N6s2W2Q4x3X3g2U0L8$3#2Q4x3V1j5`.
Errata Security Blog: 37bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6Q4x3X3g2W2M7Y4u0S2N6r3q4K6k6h3y4Q4x3X3g2U0L8$3#2Q4x3V1j5`.
Securosis Blog: 12bK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6k6h3y4#2M7X3!0K6K9i4y4Q4x3X3g2U0L8$3#2Q4x3V1k6T1L8r3!0Y4
Tripwire’s State of Security: fcaK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4c8J5K9i4m8%4K9i4u0W2i4K6u0W2j5$3!0E0i4K6u0r3M7%4c8S2N6r3g2Q4x3X3c8G2k6W2)9J5k6s2y4W2j5%4g2J5K9i4c8&6i4K6u0r3
安全产业最佳代表博客提名
RedSeal Networks: 78cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6Q4x3X3g2J5k6h3c8K6k6h3q4D9L8X3g2@1N6$3!0J5K9%4y4Q4x3X3g2U0L8$3#2Q4x3V1j5`.
Securosis: e02K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6k6h3y4#2M7X3!0K6K9i4y4Q4x3X3g2U0L8$3#2Q4x3V1k6T1L8r3!0Y4
Schneier on Security: 24aK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2K6j5$3S2F1k6h3W2W2M7W2)9J5k6h3y4G2L8g2)9J5c8R3`.`.
Naked Security: 2c4K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3&6S2K9$3g2V1M7$3g2U0N6i4u0A6N6s2W2Q4x3X3g2K6L8%4m8Z5L8%4y4Q4x3X3g2U0L8$3#2Q4x3V1j5`.
SANS Internet Storm Center Diary: c47K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6A6M7$3y4Q4x3X3g2K6j5h3&6K6i4K6u0W2k6h3c8#2i4K6u0r3k6r3W2S2M7Y4W2Q4x3X3g2Z5N6r3#2D9
Liquidmatrix Security Digest: 81fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3I4A6M7i4g2A6k6r3#2S2N6s2u0A6P5q4)9J5k6h3!0J5k6#2)9J5c8X3u0D9L8$3N6Q4x3V1j5`.
Emergent Chaos: 78bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3g2E0k6i4u0Y4k6h3&6@1j5$3S2S2L8%4y4Q4x3X3g2U0L8$3#2Q4x3V1j5`.
Infosecisland: b52K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3W2F1k6X3!0K6k6h3y4A6M7$3I4S2L8X3c8Q4x3X3g2U0L8$3#2Q4x3V1j5`.
年度单篇最佳博/播客提名
网络安全管理实用指南 05dK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6W2N6X3g2F1N6q4)9J5k6h3!0F1x3U0c8Q4x3X3g2U0L8$3#2Q4x3V1k6W2N6X3g2F1N6q4u0W2k6$3W2K6N6s2u0S2N6r3W2G2L8W2)9J5c8V1g2$3k6h3&6@1e0r3!0T1j5Y4W2e0k6i4u0$3L8r3g2@1i4K6y4r3N6r3q4J5k6$3g2@1i4K6y4p5M7X3g2Y4K9i4y4@1M7X3q4@1K9h3!0F1i4K6u0W2K9Y4y4H3i4K6t1$3k6i4k6W2L8Y4c8A6k6q4)9K6c8o6M7J5x3o6M7H3y4#2)9J5y4Y4y4W2M7%4y4A6L8$3&6A6k6q4)9K6c8o6q4Q4x3U0k6Q4x3U0k6F1j5Y4y4H3i4K6y4n7i4K6t1$3L8X3u0K6M7q4)9K6b7W2)9J5y4X3&6T1M7%4m8Q4x3@1u0Q4x3U0k6F1j5Y4y4H3i4K6y4n7i4K6t1$3L8X3u0K6M7q4)9K6b7W2)9J5y4X3&6T1M7%4m8Q4x3@1u0Q4x3U0k6F1j5Y4y4H3i4K6y4n7i4K6t1$3L8X3u0K6M7q4)9K6b7X3E0W2P5g2)9K6c8o6p5J5b7f1q4p5c8p5t1^5z5p5t1@1b7U0p5H3c8f1k6m8x3e0R3J5z5e0f1K6y4K6x3&6x3V1j5I4y4K6t1J5i4K6t1$3M7$3!0#2M7X3y4W2M7r3q4Y4k6g2)9K6c8s2u0W2k6$3W2K6N6r3g2J5
Parmy Olson的关于Anonymous的一个书评: f8bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4c8W2M7X3g2T1M7X3q4@1k6g2)9J5k6h3u0D9L8$3N6K6M7r3!0@1i4K6u0W2j5$3!0E0i4K6u0r3x3U0l9I4x3#2)9J5c8U0l9#2i4K6u0r3j5X3!0G2K9#2)9J5k6s2u0W2N6X3W2W2N6#2)9J5k6s2N6W2i4K6u0V1j5i4u0W2i4K6u0V1j5h3&6G2L8Y4W2E0L8%4g2K6i4K6u0V1K9h3&6K6K9h3c8W2i4K6u0W2K9s2c8E0L8l9`.`.
Krebs的Adobe源代码泄露和用户数据泄露事件: edfK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3E0J5k6h3u0K6L8$3&6K6k6h3y4#2M7X3W2@1P5g2)9J5k6h3y4G2L8g2)9J5c8U0t1H3x3e0y4Q4x3V1j5I4x3q4)9J5c8X3q4V1L8$3u0W2i4K6u0V1N6r3!0Q4x3X3c8S2L8X3&6G2N6h3&6U0k6g2)9J5k6s2y4G2N6i4u0U0k6g2)9J5k6r3y4G2k6r3g2Q4x3X3c8U0N6i4y4@1L8$3#2W2M7W2)9J5k6r3c8S2N6r3q4Q4x3X3c8T1M7X3g2S2j5$3S2Q4x3V1j5`.
Bruce Schneier的公布NSA计划的重要性讨论: 9eeK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2K6j5$3S2F1k6h3W2W2M7W2)9J5k6h3y4G2L8g2)9J5c8X3u0D9L8$3N6Q4x3V1k6S2M7X3y4Z5K9i4k6W2M7#2)9J5c8U0t1H3x3e0y4Q4x3V1j5I4x3q4)9J5c8Y4N6Z5P5g2)9#2k6X3W2@1M7#2)9#2k6X3W2E0M7r3!0J5N6r3q4Q4x3X3g2Z5N6r3#2D9
竞赛与技能(有关安全教育方面的文章): c88K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2U0k6i4u0A6j5i4y4Q4x3X3g2H3N6i4u0V1N6h3g2Q4x3X3g2W2k6s2g2Q4x3V1k6K6K9i4c8W2i4K6u0r3j5X3I4G2k6#2)9J5c8Y4m8G2M7%4c8Q4x3V1k6G2L8W2)9#2k6X3y4G2L8i4m8W2N6r3W2@1K9h3!0F1M7#2)9#2k6X3q4F1k6q4)9#2k6X3y4G2L8i4m8W2N6r3g2F1j5$3g2Q4x3V1j5`.
ISC2关于CISSP报考地点(2014-2017年期间)的选举事宜(Nov 16-30): e4cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4W2j5%4g2J5K9i4c8&6N6h3&6U0L8%4u0C8k6h3c8Q4x3X3g2U0L8$3#2Q4x3V1j5J5x3o6p5K6i4K6u0r3x3e0q4Q4x3V1k6U0K9i4y4K6M7q4)9J5k6r3y4S2L8r3I4Q4x3X3c8@1L8#2)9J5k6r3q4U0N6r3W2G2L8W2)9J5k6r3W2K6j5K6u0Q4x3X3c8W2L8r3g2U0N6r3W2G2L8Y4y4Q4x3V1j5`.
关于Defcon禁止美国当局feds参加会议的讨论: 415K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4m8G2L8r3W2U0k6h3I4W2k6r3W2F1N6r3g2D9L8r3W2Y4k6h3&6U0k6g2)9J5k6h3y4G2L8g2)9J5c8U0t1H3x3e0y4Q4x3V1j5H3y4#2)9J5c8U0p5I4i4K6u0r3j5X3q4F1L8X3W2F1k6#2)9J5k6r3k6W2k6s2y4Q4x3X3c8X3M7X3!0E0i4K6u0V1k6r3g2X3j5$3!0F1i4K6u0V1K9i4y4Q4x3X3c8K6k6h3I4X3i4K6u0V1k6r3g2X3k6h3q4@1K9h3&6Y4i4K6u0V1K9r3g2J5k6i4y4Q4x3X3c8%4K9s2W2Q4x3V1j5`.
看过《国土安全》这美剧没?没有,那你知道心脏起搏器可以被黑吗?不知道,那你就不要看这篇文章了: a05K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6Q4x3X3g2A6L8$3q4U0N6r3W2$3k6g2)9J5k6h3y4G2L8g2)9J5c8U0t1H3x3e0y4Q4x3V1j5H3x3W2)9J5c8X3u0J5L8$3E0W2L8W2)9J5k6r3S2W2j5i4u0@1M7#2)9J5k6r3S2G2N6#2)9J5k6s2m8D9j5i4g2K6K9h3u0D9k6g2)9J5k6s2N6S2M7#2)9J5k6h3S2@1L8h3H3`.
安全博客主名人堂提名
The hackers post: 61aK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4c8Z5k6h3S2S2j5$3E0W2M7Y4y4H3L8%4y4@1i4K6u0W2j5$3!0E0
J4VV4D: 4b6K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3Z5@1N6Y4j5@1k6q4)9J5k6h3y4G2L8g2)9J5c8R3`.`.
Dan Kaminsky (Or: The Blog Formerly Known As DoxPara Resarch) – 801K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3c8S2L8X3E0S2L8h3W2F1M7$3E0&6i4K6u0W2j5$3!0E0i4K6u0r3j5$3q4@1k6h3N6G2M7Y4W2Q4x3V1k6K6k6h3y4#2M7X3W2@1P5g2)9J5c8R3`.`.
Martin McKeay Network Security Blog: 65bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2U0K9$3g2S2P5g2)9J5k6h3&6W2N6q4)9J5c8X3q4#2N6r3S2G2M7W2)9J5c8X3#2S2M7Y4c8A6L8W2)9J5c8R3`.`.
Andy Greenberg, Forbes: 194K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3k6G2M7X3u0W2M7#2)9J5k6h3y4G2L8g2)9J5c8Y4y4A6N6r3g2K6i4K6u0r3j5h3&6V1P5h3N6J5k6h3g2F1j5X3g2J5k6#2)9J5c8R3`.`.
Lori MacVittie, F5 DevCentral: 9ddK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6V1k6i4k6U0k6h3&6@1M7X3q4D9i4K6u0W2k6U0g2Q4x3X3g2U0L8$3#2Q4x3V1k6#2M7$3g2J5M7#2)9J5c8U0x3^5i4K6u0r3L8i4W2Q4x3X3c8U0L8$3&6@1M7X3W2T1N6i4c8A6L8$3&6K6i4K6u0r3N6s2W2H3k6h3W2V1i4K6u0r3z5b7`.`.
Emergent Chaos: 0adK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3g2E0k6i4u0Y4k6h3&6@1j5$3S2S2L8%4y4Q4x3X3g2U0L8$3#2Q4x3V1j5`.
Tracy Kitten: The Fraud Blog: 5f4K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3u0S2L8X3E0A6L8X3k6G2M7$3g2U0N6i4u0A6N6s2W2Q4x3X3g2U0L8$3#2Q4x3V1k6T1L8r3!0Y4M7#2)9J5c8X3k6J5j5i4g2V1i4K6u0V1j5X3I4G2k6#2)9J5k6r3u0Q4x3X3b7I4z5l9`.`.
Eric Chabrow: The Public Eye: 1d5K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3N6G2N6X3W2F1k6X3!0K6k6h3y4#2M7X3W2@1P5g2)9J5k6h3y4G2L8g2)9J5c8X3u0D9L8$3N6K6i4K6u0r3M7s2g2T1L8r3W2U0i4K6u0V1k6i4W2W2i4K6u0V1j5W2)9J5k6o6p5K6
最佳安全新闻博客提名
Gunter Ollmann, Dark Reading, Attacks and Breaches: 197K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3c8S2M7X3E0J5k6h3q4V1K9h3&6Y4i4K6u0W2j5$3!0E0i4K6u0r3j5i4c8@1j5h3y4C8M7#2)9J5k6r3u0J5k6h3q4U0K9r3g2K6
Jitender's Perspective: 672K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3A6A6N6r3g2F1k6r3g2J5j5i4u0G2M7X3q4Q4x3X3g2U0L8#2)9J5k6i4g2C8i4K6u0r3j5X3I4G2k6#2)9J5c8R3`.`.
OMENS Blog: 5efK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2#2M7$3g2U0N6r3g2U0K9q4)9J5k6h3y4G2L8g2)9J5c8V1!0y4c8f1&6e0f1r3!0J5N6r3q4D9i4K6u0r3L8$3#2W2L8Y4y4Q4x3X3c8T1L8r3!0Y4i4K6u0W2j5i4y4H3P5l9`.`.
Cyb3r Assassins: 5d8K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6U0P5h3t1K6M7X3q4K6M7$3q4K6M7$3W2F1i4K6u0W2N6$3!0J5k6s2m8J5k6i4y4K6i4K6u0W2j5$3!0E0i4K6u0r3
Security Management HQ: 49eK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4W2j5%4g2J5K9i4c8&6L8h3q4F1j5h3N6W2L8h3g2F1N6r3S2I4i4K6u0W2j5$3!0E0i4K6u0r3
Exploring Possibility Space: 653K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3g2^5M7r3I4G2M7X3W2F1k6%4m8G2M7%4y4A6j5X3W2D9K9i4c8&6M7%4m8S2j5$3g2Q4x3X3g2T1L8r3!0Y4M7%4m8G2N6q4)9J5k6h3y4G2L8g2)9J5c8R3`.`.
USA TODAY, CyberTruth: 7ecK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4g2K6j5i4c8G2k6r3q4&6i4K6u0W2j5$3!0E0i4K6u0r3j5X3I4G2k6#2)9J5c8X3y4&6j5X3g2J5N6s2u0#2N6r3S2Q4x3V1j5`.
今年美国RSA大会将在这个月的23-28号举行,每年大会上都会评出过去一年来业内最佳安全博客(Security Bloggers Network Social Security Awards 2014),该投票已于2月14日停止了投票,大奖得主将于RSA大会上公布。现在我们抢先看看都有哪些提名。(部分有重复,排名不分先后),最终结果且听下周分解。
最佳企业安全博客提名:
Juniper(网络厂商,不用多介绍):a89K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3k6G2M7Y4g2E0M7#2)9J5k6h3A6#2L8X3W2H3k6i4u0Q4x3X3g2F1k6i4c8Q4x3V1k6@1y4g2)9J5c8W2y4W2j5%4g2J5K9i4c8&6i4K6u0V1e0h3!0T1K9h3I4A6N6s2W2Q4x3X3c8z5L8%4N6Q4x3V1k6T1k6#2)9J5k6s2m8Q4x3V1k6F1k6i4c8%4L8%4u0C8K9h3&6Y4L8X3!0%4
Norse(提供前摄性的安全解决方案,基于dark intelligence平台防御当局高级威胁:3e0K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3&6G2M7Y4y4W2i4K6u0V1j5$3!0J5M7q4)9J5k6h3y4G2L8g2)9J5c8X3u0D9L8$3N6Q4x3X3c8A6L8X3c8W2P5q4)9J5k6h3S2@1L8h3H3`.
RedSeal Networks(安全管理解决方案): 660K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6Q4x3X3g2J5k6h3c8K6k6h3q4D9L8X3g2@1N6$3!0J5K9%4y4Q4x3X3g2U0L8$3#2Q4x3V1j5`.
Solutionary Minds: afcK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4G2L8s2g2@1K9h3!0F1j5i4u0&6i4K6u0W2j5$3!0E0i4K6u0r3M7X3g2K6L8%4g2J5j5$3g2Q4x3X3c8U0k6h3&6@1k6i4u0Q4x3V1k6T1L8r3!0Y4i4K6u0r3
VioPoint(提供MSS服务): eb3K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4k6A6L8%4m8G2K9h3&6@1i4K6u0W2j5$3!0E0i4K6u0r3j5X3I4G2k6#2)9J5c8R3`.`.
WhiteHat Security: bdbK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1L8r3!0Y4i4K6u0W2N6$3S2A6N6r3g2Z5j5i4c8K6k6h3y4Q4x3X3g2U0L8$3@1`.
TripWire: The State of Security: 47aK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4c8J5K9i4m8%4K9i4u0W2i4K6u0W2j5$3!0E0i4K6u0r3M7%4c8S2N6r3g2Q4x3X3c8G2k6W2)9J5k6s2y4W2j5%4g2J5K9i4c8&6i4K6u0r3
Veracode Blog(基于云的软件安全供应商): 5fbK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4k6W2M7X3q4U0L8$3c8W2i4K6u0W2j5$3!0E0i4K6u0r3j5X3I4G2k6#2)9J5c8R3`.`.
Mandiant M-unition: 5d3K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2E0j5h3&6V1K9h3q4F1N6q4)9J5k6h3y4G2L8g2)9J5c8X3u0D9L8$3N6Q4x3V1j5`.
Fortinet Blog(UTM,NGFW…): 59aK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6Q4x3X3g2X3L8%4u0@1K9h3&6W2N6q4)9J5k6h3y4G2L8g2)9J5c8R3`.`.
F-Secure Blog: c9fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3k6Q4x3X3c8K6k6h3y4#2M7X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6%4k6h3u0D9L8$3N6Q4x3V1j5`.
Trend Micro Security Intelligence Blog(趋势科技): 5b6K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6Q4x3X3g2@1M7X3g2F1k6r3#2A6j5%4u0G2i4K6u0W2j5$3!0E0i4K6u0r3N6s2u0W2L8X3c8D9j5h3u0K6i4K6u0V1M7$3g2U0N6i4u0A6N6s2W2Q4x3X3c8A6L8Y4c8W2L8r3I4A6k6$3g2F1j5$3g2Q4x3V1j5`.
Kaspersky Lab Securelist(卡巴斯基): 293K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4W2j5%4g2J5k6h3I4A6M7%4c8Q4x3X3g2U0L8$3#2Q4x3V1k6W2L8W2)9J5c8X3u0D9L8$3M7`.
Akamai Blog(云平台,CDN…): 6eeK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1L8r3!0Y4M7#2)9J5k6h3q4C8j5h3#2S2K9g2)9J5k6h3y4G2L8g2)9J5c8Y4y4W2j5%4g2J5K9i4c8&6i4K6u0r3
Bit9(白名单软件机制管理厂商): f6eK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1L8r3!0Y4i4K6u0W2j5X3W2@1z5g2)9J5k6h3y4G2L8g2)9J5c8R3`.`.
IOActive(安全评估公司): 2d3K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6Q4x3X3g2A6L8$3q4U0N6r3W2$3k6g2)9J5k6h3y4G2L8g2)9J5c8R3`.`.
最佳安全播客提名:
SANS 的ISC每日播报 Stormcast: 377K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6A6M7$3y4Q4x3X3g2K6j5h3&6K6i4K6u0W2k6h3c8#2i4K6u0r3M7r3!0V1j5$3q4K6N6q4)9J5k6h3S2@1L8h3H3`.
MiSec, OWASP Detroit, BSides Detroit的播客: 2f0K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4m8G2k6r3y4S2M7%4c8Q4x3X3g2E0K9h3y4Z5M7$3g2U0i4K6u0W2L8%4u0Y4i4K6u0r3
Security Slice: c68K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4c8J5K9i4m8%4K9i4u0W2i4K6u0W2j5$3!0E0i4K6u0r3M7%4c8S2N6r3g2Q4x3X3c8G2k6W2)9J5k6s2y4W2j5%4g2J5K9i4c8&6i4K6u0r3N6r3!0H3K9h3y4K6i4K6u0r3M7$3g2U0N6i4u0A6N6s2W2Q4x3X3c8K6L8r3W2U0k6g2)9J5k6s2m8G2k6r3y4S2M7%4c8Q4x3V1j5`.
Threat Post: af6K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2@1K9s2u0W2j5i4c8H3L8%4y4@1i4K6u0W2j5$3!0E0
Security Ledger: 5f5K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6k6h3y4#2M7X3W2@1P5h3I4W2k6r3N6W2M7W2)9J5k6h3y4G2L8g2)9J5c8X3y4S2N6r3g2Y4L8%4u0&6i4K6u0r3M7r3!0V1j5$3q4K6N6s2y4Q4x3V1j5`.
The Risk Science Podcast: dceK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0A6M7$3E0K6j5$3W2W2L8X3y4W2i4K6u0W2L8X3g2@1i4K6u0r3
SecurityWeekly: 158K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4m8S2N6h3I4V1L8%4c8U0L8$3#2Q4x3X3g2U0L8$3#2Q4x3V1j5`.
Securosis, Firestarter: 7c8K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6k6h3y4#2M7X3!0K6K9i4y4Q4x3X3g2U0L8$3#2Q4x3V1k6T1L8r3!0Y4i4K6u0r3k6X3W2J5k6i4y4@1j5i4u0@1k6i4u0Q4x3X3c8@1K9r3g2Q4x3X3c8F1M7$3q4Q4x3X3c8S2L8X3c8Q4x3X3c8J5M7$3p5`.
最佳教育安全博客提名:
RedSeal Networks: 437K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6Q4x3X3g2J5k6h3c8K6k6h3q4D9L8X3g2@1N6$3!0J5K9%4y4Q4x3X3g2U0L8$3#2Q4x3V1j5`.
Terebrate: 9fbK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4c8W2M7X3g2T1M7X3q4@1k6g2)9J5k6h3u0D9L8$3N6K6M7r3!0@1i4K6u0W2j5$3!0E0i4K6u0r3
EFF’s Deep Links: 7eaK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2W2k6X3k6Q4x3X3g2G2M7X3N6Q4x3V1k6V1k6h3g2H3L8r3W2F1K9%4x3`.
Security Bistro: ed6K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4W2j5%4g2J5K9i4c8&6j5X3W2K6N6s2u0G2i4K6u0W2j5$3!0E0i4K6u0r3
Graham Cluley: acbK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3N6J5j5h3S2S2L8h3y4D9N6h3I4W2P5g2)9J5k6h3y4G2L8g2)9J5c8R3`.`.
Krebs on security: 181K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3E0J5k6h3u0K6L8$3&6K6k6h3y4#2M7X3W2@1P5g2)9J5k6h3y4G2L8g2)9J5c8W2)9J5y4X3&6T1M7%4m8Q4x3@1u0Q4c8e0g2Q4z5p5k6Q4b7f1k6Q4c8e0g2Q4z5p5k6Q4z5o6u0Q4c8e0S2Q4z5o6m8Q4z5o6y4Q4c8e0S2Q4b7V1k6Q4z5e0q4Q4c8e0k6Q4z5f1y4Q4z5f1k6X3M7X3g2W2j5Y4g2X3i4@1f1@1i4@1t1^5i4K6S2m8i4@1f1%4i4K6W2m8i4K6R3@1i4@1f1@1i4@1u0m8i4@1u0m8i4@1f1%4i4K6R3&6i4@1p5&6i4@1f1@1i4@1t1^5i4K6V1K6i4@1f1^5i4@1q4q4i4@1u0r3i4@1f1K6i4K6R3H3i4K6S2m8i4@1f1@1i4@1u0m8i4@1u0m8i4@1f1%4i4K6R3&6i4@1p5&6i4@1g2r3i4@1u0o6i4K6W2m8i4@1f1@1i4@1u0n7i4K6V1$3i4@1f1$3i4K6V1^5i4@1q4r3i4@1f1@1i4@1u0m8i4K6V1J5i4@1f1^5i4K6R3I4i4K6V1@1i4@1f1%4i4@1u0p5i4K6V1I4i4@1f1@1i4@1t1^5i4K6V1$3i4@1f1%4i4K6V1#2i4K6S2o6i4@1f1%4i4K6W2m8i4K6R3@1i4@1f1%4i4@1p5%4i4K6R3I4i4@1f1#2i4@1q4q4i4@1t1$3i4@1f1@1i4@1u0q4i4@1p5$3i4@1f1$3i4K6S2q4i4@1p5J5i4@1f1K6i4K6R3H3i4K6S2n7i4K6t1$3L8X3u0K6M7q4)9K6b7R3`.`.
Identropy Blog: 615K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6Q4x3X3g2A6k6r3g2F1N6s2u0G2M7s2W2Q4x3X3g2U0L8$3#2Q4x3V1j5`.
Dell SecureWorks Security and Compliance Blog: 551K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4W2j5%4g2J5k6i4N6G2M7X3E0K6i4K6u0W2j5$3!0E0i4K6u0r3M7X3g2K6L8%4g2J5j5$3g2K6i4K6u0r3j5X3I4G2k6#2)9J5c8R3`.`.
Securosis: 74cK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6k6h3y4#2M7X3!0K6K9i4y4Q4x3X3g2U0L8$3#2Q4x3V1k6T1L8r3!0Y4
Solutionary Minds Blog: eb0K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4G2L8s2g2@1K9h3!0F1j5i4u0&6i4K6u0W2j5$3!0E0i4K6u0r3M7X3g2K6L8%4g2J5j5$3g2Q4x3X3c8U0k6h3&6@1k6i4u0Q4x3V1k6T1L8r3!0Y4i4K6u0r3
Rapid7 SecurityStreet: 71cK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6U0L8$3#2E0N6h3&6A6N6s2W2Q4x3X3g2J5j5i4m8A6k6o6N6Q4x3X3g2U0L8$3#2Q4x3V1k6U0L8$3&6@1k6h3&6@1i4K6t1K6k6X3W2D9N6r3g2J5d9f1c8Q4x3@1c8S2L8r3I4Q4y4@1g2G2j5X3A6W2j5%4c8@1P5i4m8W2i4K6N6q4L8$3u0B7k6h3y4@1N6s2W2H3k6g2)9#2b7X3u0D9L8$3N6H3L8%4y4@1i4K6g2p5
最佳娱乐安全博客提名
Krypt3ia: ce5K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3E0J5P5i4m8@1x3$3W2S2i4K6u0W2N6$3!0J5k6s2m8J5k6i4y4K6i4K6u0W2j5$3!0E0i4K6u0r3
Kevin Townsend: Security centric issues, news, rants – and other things: 575K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3E0W2N6Y4c8G2N6$3&6K6k6h3&6V1i4K6u0W2N6$3!0J5k6s2m8J5k6i4y4K6i4K6u0W2j5$3!0E0i4K6u0r3
Matt Blaze’s Exhaustive Search: 51aK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3y4J5P5i4m8@1L8#2)9J5k6h3y4G2L8g2)9J5c8X3u0D9L8$3M7`.
The New School of Information Security Blog: d2cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3&6W2N6%4y4U0K9r3!0G2L8s2y4W2j5%4g2J5K9i4c8&6i4K6u0W2j5$3!0E0i4K6u0r3
Uncommon Sense Security: 766K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6Q4x3X3g2#2L8X3y4G2L8h3#2G2L8Y4y4W2L8Y4y4W2M7$3g2U0N6i4u0A6N6s2W2Q4x3X3g2U0L8$3#2Q4x3V1j5`.
Errata Security Blog: 37bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6Q4x3X3g2W2M7Y4u0S2N6r3q4K6k6h3y4Q4x3X3g2U0L8$3#2Q4x3V1j5`.
Securosis Blog: 12bK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6k6h3y4#2M7X3!0K6K9i4y4Q4x3X3g2U0L8$3#2Q4x3V1k6T1L8r3!0Y4
Tripwire’s State of Security: fcaK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4c8J5K9i4m8%4K9i4u0W2i4K6u0W2j5$3!0E0i4K6u0r3M7%4c8S2N6r3g2Q4x3X3c8G2k6W2)9J5k6s2y4W2j5%4g2J5K9i4c8&6i4K6u0r3
安全产业最佳代表博客提名
RedSeal Networks: 78cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6Q4x3X3g2J5k6h3c8K6k6h3q4D9L8X3g2@1N6$3!0J5K9%4y4Q4x3X3g2U0L8$3#2Q4x3V1j5`.
Securosis: e02K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6k6h3y4#2M7X3!0K6K9i4y4Q4x3X3g2U0L8$3#2Q4x3V1k6T1L8r3!0Y4
Schneier on Security: 24aK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2K6j5$3S2F1k6h3W2W2M7W2)9J5k6h3y4G2L8g2)9J5c8R3`.`.
Naked Security: 2c4K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3&6S2K9$3g2V1M7$3g2U0N6i4u0A6N6s2W2Q4x3X3g2K6L8%4m8Z5L8%4y4Q4x3X3g2U0L8$3#2Q4x3V1j5`.
SANS Internet Storm Center Diary: c47K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6A6M7$3y4Q4x3X3g2K6j5h3&6K6i4K6u0W2k6h3c8#2i4K6u0r3k6r3W2S2M7Y4W2Q4x3X3g2Z5N6r3#2D9
Liquidmatrix Security Digest: 81fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3I4A6M7i4g2A6k6r3#2S2N6s2u0A6P5q4)9J5k6h3!0J5k6#2)9J5c8X3u0D9L8$3N6Q4x3V1j5`.
Emergent Chaos: 78bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3g2E0k6i4u0Y4k6h3&6@1j5$3S2S2L8%4y4Q4x3X3g2U0L8$3#2Q4x3V1j5`.
Infosecisland: b52K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3W2F1k6X3!0K6k6h3y4A6M7$3I4S2L8X3c8Q4x3X3g2U0L8$3#2Q4x3V1j5`.
年度单篇最佳博/播客提名
网络安全管理实用指南 05dK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6W2N6X3g2F1N6q4)9J5k6h3!0F1x3U0c8Q4x3X3g2U0L8$3#2Q4x3V1k6W2N6X3g2F1N6q4u0W2k6$3W2K6N6s2u0S2N6r3W2G2L8W2)9J5c8V1g2$3k6h3&6@1e0r3!0T1j5Y4W2e0k6i4u0$3L8r3g2@1i4K6y4r3N6r3q4J5k6$3g2@1i4K6y4p5M7X3g2Y4K9i4y4@1M7X3q4@1K9h3!0F1i4K6u0W2K9Y4y4H3i4K6t1$3k6i4k6W2L8Y4c8A6k6q4)9K6c8o6M7J5x3o6M7H3y4#2)9J5y4Y4y4W2M7%4y4A6L8$3&6A6k6q4)9K6c8o6q4Q4x3U0k6Q4x3U0k6F1j5Y4y4H3i4K6y4n7i4K6t1$3L8X3u0K6M7q4)9K6b7W2)9J5y4X3&6T1M7%4m8Q4x3@1u0Q4x3U0k6F1j5Y4y4H3i4K6y4n7i4K6t1$3L8X3u0K6M7q4)9K6b7W2)9J5y4X3&6T1M7%4m8Q4x3@1u0Q4x3U0k6F1j5Y4y4H3i4K6y4n7i4K6t1$3L8X3u0K6M7q4)9K6b7X3E0W2P5g2)9K6c8o6p5J5b7f1q4p5c8p5t1^5z5p5t1@1b7U0p5H3c8f1k6m8x3e0R3J5z5e0f1K6y4K6x3&6x3V1j5I4y4K6t1J5i4K6t1$3M7$3!0#2M7X3y4W2M7r3q4Y4k6g2)9K6c8s2u0W2k6$3W2K6N6r3g2J5
Parmy Olson的关于Anonymous的一个书评: f8bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4c8W2M7X3g2T1M7X3q4@1k6g2)9J5k6h3u0D9L8$3N6K6M7r3!0@1i4K6u0W2j5$3!0E0i4K6u0r3x3U0l9I4x3#2)9J5c8U0l9#2i4K6u0r3j5X3!0G2K9#2)9J5k6s2u0W2N6X3W2W2N6#2)9J5k6s2N6W2i4K6u0V1j5i4u0W2i4K6u0V1j5h3&6G2L8Y4W2E0L8%4g2K6i4K6u0V1K9h3&6K6K9h3c8W2i4K6u0W2K9s2c8E0L8l9`.`.
Krebs的Adobe源代码泄露和用户数据泄露事件: edfK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3E0J5k6h3u0K6L8$3&6K6k6h3y4#2M7X3W2@1P5g2)9J5k6h3y4G2L8g2)9J5c8U0t1H3x3e0y4Q4x3V1j5I4x3q4)9J5c8X3q4V1L8$3u0W2i4K6u0V1N6r3!0Q4x3X3c8S2L8X3&6G2N6h3&6U0k6g2)9J5k6s2y4G2N6i4u0U0k6g2)9J5k6r3y4G2k6r3g2Q4x3X3c8U0N6i4y4@1L8$3#2W2M7W2)9J5k6r3c8S2N6r3q4Q4x3X3c8T1M7X3g2S2j5$3S2Q4x3V1j5`.
Bruce Schneier的公布NSA计划的重要性讨论: 9eeK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2K6j5$3S2F1k6h3W2W2M7W2)9J5k6h3y4G2L8g2)9J5c8X3u0D9L8$3N6Q4x3V1k6S2M7X3y4Z5K9i4k6W2M7#2)9J5c8U0t1H3x3e0y4Q4x3V1j5I4x3q4)9J5c8Y4N6Z5P5g2)9#2k6X3W2@1M7#2)9#2k6X3W2E0M7r3!0J5N6r3q4Q4x3X3g2Z5N6r3#2D9
竞赛与技能(有关安全教育方面的文章): c88K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2U0k6i4u0A6j5i4y4Q4x3X3g2H3N6i4u0V1N6h3g2Q4x3X3g2W2k6s2g2Q4x3V1k6K6K9i4c8W2i4K6u0r3j5X3I4G2k6#2)9J5c8Y4m8G2M7%4c8Q4x3V1k6G2L8W2)9#2k6X3y4G2L8i4m8W2N6r3W2@1K9h3!0F1M7#2)9#2k6X3q4F1k6q4)9#2k6X3y4G2L8i4m8W2N6r3g2F1j5$3g2Q4x3V1j5`.
ISC2关于CISSP报考地点(2014-2017年期间)的选举事宜(Nov 16-30): e4cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4W2j5%4g2J5K9i4c8&6N6h3&6U0L8%4u0C8k6h3c8Q4x3X3g2U0L8$3#2Q4x3V1j5J5x3o6p5K6i4K6u0r3x3e0q4Q4x3V1k6U0K9i4y4K6M7q4)9J5k6r3y4S2L8r3I4Q4x3X3c8@1L8#2)9J5k6r3q4U0N6r3W2G2L8W2)9J5k6r3W2K6j5K6u0Q4x3X3c8W2L8r3g2U0N6r3W2G2L8Y4y4Q4x3V1j5`.
关于Defcon禁止美国当局feds参加会议的讨论: 415K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4m8G2L8r3W2U0k6h3I4W2k6r3W2F1N6r3g2D9L8r3W2Y4k6h3&6U0k6g2)9J5k6h3y4G2L8g2)9J5c8U0t1H3x3e0y4Q4x3V1j5H3y4#2)9J5c8U0p5I4i4K6u0r3j5X3q4F1L8X3W2F1k6#2)9J5k6r3k6W2k6s2y4Q4x3X3c8X3M7X3!0E0i4K6u0V1k6r3g2X3j5$3!0F1i4K6u0V1K9i4y4Q4x3X3c8K6k6h3I4X3i4K6u0V1k6r3g2X3k6h3q4@1K9h3&6Y4i4K6u0V1K9r3g2J5k6i4y4Q4x3X3c8%4K9s2W2Q4x3V1j5`.
看过《国土安全》这美剧没?没有,那你知道心脏起搏器可以被黑吗?不知道,那你就不要看这篇文章了: a05K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6Q4x3X3g2A6L8$3q4U0N6r3W2$3k6g2)9J5k6h3y4G2L8g2)9J5c8U0t1H3x3e0y4Q4x3V1j5H3x3W2)9J5c8X3u0J5L8$3E0W2L8W2)9J5k6r3S2W2j5i4u0@1M7#2)9J5k6r3S2G2N6#2)9J5k6s2m8D9j5i4g2K6K9h3u0D9k6g2)9J5k6s2N6S2M7#2)9J5k6h3S2@1L8h3H3`.
安全博客主名人堂提名
The hackers post: 61aK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4c8Z5k6h3S2S2j5$3E0W2M7Y4y4H3L8%4y4@1i4K6u0W2j5$3!0E0
J4VV4D: 4b6K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3Z5@1N6Y4j5@1k6q4)9J5k6h3y4G2L8g2)9J5c8R3`.`.
Dan Kaminsky (Or: The Blog Formerly Known As DoxPara Resarch) – 801K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3c8S2L8X3E0S2L8h3W2F1M7$3E0&6i4K6u0W2j5$3!0E0i4K6u0r3j5$3q4@1k6h3N6G2M7Y4W2Q4x3V1k6K6k6h3y4#2M7X3W2@1P5g2)9J5c8R3`.`.
Martin McKeay Network Security Blog: 65bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2U0K9$3g2S2P5g2)9J5k6h3&6W2N6q4)9J5c8X3q4#2N6r3S2G2M7W2)9J5c8X3#2S2M7Y4c8A6L8W2)9J5c8R3`.`.
Andy Greenberg, Forbes: 194K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3k6G2M7X3u0W2M7#2)9J5k6h3y4G2L8g2)9J5c8Y4y4A6N6r3g2K6i4K6u0r3j5h3&6V1P5h3N6J5k6h3g2F1j5X3g2J5k6#2)9J5c8R3`.`.
Lori MacVittie, F5 DevCentral: 9ddK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6V1k6i4k6U0k6h3&6@1M7X3q4D9i4K6u0W2k6U0g2Q4x3X3g2U0L8$3#2Q4x3V1k6#2M7$3g2J5M7#2)9J5c8U0x3^5i4K6u0r3L8i4W2Q4x3X3c8U0L8$3&6@1M7X3W2T1N6i4c8A6L8$3&6K6i4K6u0r3N6s2W2H3k6h3W2V1i4K6u0r3z5b7`.`.
Emergent Chaos: 0adK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3g2E0k6i4u0Y4k6h3&6@1j5$3S2S2L8%4y4Q4x3X3g2U0L8$3#2Q4x3V1j5`.
Tracy Kitten: The Fraud Blog: 5f4K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3u0S2L8X3E0A6L8X3k6G2M7$3g2U0N6i4u0A6N6s2W2Q4x3X3g2U0L8$3#2Q4x3V1k6T1L8r3!0Y4M7#2)9J5c8X3k6J5j5i4g2V1i4K6u0V1j5X3I4G2k6#2)9J5k6r3u0Q4x3X3b7I4z5l9`.`.
Eric Chabrow: The Public Eye: 1d5K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3N6G2N6X3W2F1k6X3!0K6k6h3y4#2M7X3W2@1P5g2)9J5k6h3y4G2L8g2)9J5c8X3u0D9L8$3N6K6i4K6u0r3M7s2g2T1L8r3W2U0i4K6u0V1k6i4W2W2i4K6u0V1j5W2)9J5k6o6p5K6
最佳安全新闻博客提名
Gunter Ollmann, Dark Reading, Attacks and Breaches: 197K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3c8S2M7X3E0J5k6h3q4V1K9h3&6Y4i4K6u0W2j5$3!0E0i4K6u0r3j5i4c8@1j5h3y4C8M7#2)9J5k6r3u0J5k6h3q4U0K9r3g2K6
Jitender's Perspective: 672K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3A6A6N6r3g2F1k6r3g2J5j5i4u0G2M7X3q4Q4x3X3g2U0L8#2)9J5k6i4g2C8i4K6u0r3j5X3I4G2k6#2)9J5c8R3`.`.
OMENS Blog: 5efK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2#2M7$3g2U0N6r3g2U0K9q4)9J5k6h3y4G2L8g2)9J5c8V1!0y4c8f1&6e0f1r3!0J5N6r3q4D9i4K6u0r3L8$3#2W2L8Y4y4Q4x3X3c8T1L8r3!0Y4i4K6u0W2j5i4y4H3P5l9`.`.
Cyb3r Assassins: 5d8K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6U0P5h3t1K6M7X3q4K6M7$3q4K6M7$3W2F1i4K6u0W2N6$3!0J5k6s2m8J5k6i4y4K6i4K6u0W2j5$3!0E0i4K6u0r3
Security Management HQ: 49eK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4W2j5%4g2J5K9i4c8&6L8h3q4F1j5h3N6W2L8h3g2F1N6r3S2I4i4K6u0W2j5$3!0E0i4K6u0r3
Exploring Possibility Space: 653K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3g2^5M7r3I4G2M7X3W2F1k6%4m8G2M7%4y4A6j5X3W2D9K9i4c8&6M7%4m8S2j5$3g2Q4x3X3g2T1L8r3!0Y4M7%4m8G2N6q4)9J5k6h3y4G2L8g2)9J5c8R3`.`.
USA TODAY, CyberTruth: 7ecK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4g2K6j5i4c8G2k6r3q4&6i4K6u0W2j5$3!0E0i4K6u0r3j5X3I4G2k6#2)9J5c8X3y4&6j5X3g2J5N6s2u0#2N6r3S2Q4x3V1j5`.
赞赏
赞赏
雪币:
留言: