|By Marketwired .||
|January 28, 2014 12:00 PM EST||
SAN FRANCISCO, CA -- (Marketwired) -- 01/28/14 -- The Security Blogger Network (SBN), the largest collection of information-security-focused blogs and podcasts in the world, today announced the SBN Social Security Awards 2014 finalists. A blue-ribbon panel of judges and the 400-plus SBN blogger members nominated candidates. The SBN, in conjunction with Trainer Communications, a high-tech integrated marketing and public relations agency, has opened voting today, which will extend through Friday, Feb. 14. To vote, visit: https://www.surveymonkey.com/s/SBNawards2014. Voting is open to anyone; duplicate votes will be eliminated, and voters must provide a legitimate name and email address in order for their ballot to be counted.
This year, award winners will be recognized in multiple categories, including Best Corporate Security Blog, Best Security Blog, Most Educational Security Blog, Most Entertaining Security Blog, Blog that Best Represents the Security Industry, Single Best Blog or Podcast of the Year, The Security Bloggers Hall of Fame and Best New Security Blog. This year's sponsors include Kaspersky Labs, Sourcefire (now part of Cisco), Akamai, Fortinet, Tripwire, Barracuda Networks, Qualys, RSA Conference and Trainer Communications
Nominees this year are Juniper Networks: Security & Mobility Now, Norse, RedSeal Networks, Solutionary: Minds, VioPoint, WhiteHat Security, TripWire: The State of Security, Veracode, Mandiant: M-unition, Fortinet, F-SECURE, Trend Micro TrendLabs Security Intelligence, Kaspersky Lab: Securelist, Akamai, Bit9, IOActive, SANS: Daily Internet Storm Center Stormcast, michsec, TripWire: Security Slice, Threat Post, The Security Ledger, The Risk Science Podcast, SecurityWeekly, Securosis: Firestarter, Terabrate, Electronic Frontier Foundation (EFF): Deeplinks, Security bistro, Graham Cluley, Krebs on Security, Identropy, Dell: SecureWorks, Securosis, SecurityStreetRapid7, Krypt3ia, Kevin Townsend, Matt Blaze's Exhaustive Search, The New School of Information Security, Uncommon Sense Security, Errata Security, Schneier on Security, Sophos: nakedsecurity, SANS: Internet Storm Center Diary, Liquidmatrix Security Digest, Emergent Chaos, Infosec island, RedSeal Networks: Making Security Works, Terabrate: Book Review: "We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous and the Global Cyber Insurgency (2012)" by Parmy Olson, Krebs on Security: Adobe To Announce Source Code, Customer Data Breach, Schneier On Security: Why It's Important to Publish the NSA Programs, CERIAS: On Competitions and Competence, Security Uncorked: CISSPs: Call to Action for (ISC)2 Elections (Nov 16-30), Police-Led Intelligence-Led Policing: Banning Feds from DefCon is Self Defeating. Here's Why, IOActive: "Broken Hearts": How plausible was the Homeland pacemaker hack?, The Hackers Post, J4VV4D, Dan Kaminsky's Blog, Martin McKeay Network Security Blog, Andy Greenberg, Forbes, Lori MacVittie, F5 DevCentral, Tracy Kitten, The Fraud Blog, Eric Chabrow, The Public Eye, Gunter Ollmann, Dark Reading, Attacks and Breaches, Jitender's Perspective, OMENSPortal, Cyb3r-Assassin, Security Management HQ, Exploring Possibility Space, Venafi, and USA TODAY: CyberTruth.
About Security Bloggers Network
The Security Bloggers Network (SBN) is the largest collection of information security focused blogs and podcasts in the world. Almost 400 blogs and podcasts are included in the SBN's aggregated feed at their own request. The SBN does not include any blog or podcast feed without the author's permission and request. The blogs range from some of the biggest corporate security blogs, such as IBM/ISS, to those of individual security practitioners the world over. The SBN does not filter or edit any of the blogs and links back to the original blog on each post. If you publish a blog or podcast focused on security, you can request to have your blog included in the SBN by writing to [email protected]. Please include your contact info, the URL of your blog and the RSS feed. To subscribe to the feed, visit: http://www.securitybloggersnetwork.com/security-bloggers-network-the-feed/.
About Trainer Communications
Trainer Communications is a premier integrated public relations and marketing agency in the San Francisco Bay Area. Specializing in technology, the agency offers deep domain expertise across storage, information security, telecommunications and wireless, enterprise software, networking, and consumer industries. Trainer represents emerging and high-growth technology companies that require market recognition and visibility to meet business objectives and is the only agency that guarantees quantifiable results with its Metrics Matter methodology. Established in 1995, more than 250 companies have relied on Trainer for strong marketing and PR strategies and support. The San Francisco PR and marketing agency has received several dozen national awards such as PRSA Anvils, Bulldog Awards, MarCom Awards, Iron Sabre Awards, and Videographer Awards for excellence in public relations, website design, and video and animation production. For more information, visit: www.trainercomm.com.
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 27, 2014 07:45 PM EST Reads: 2,026
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect...
Dec. 27, 2014 07:00 PM EST Reads: 2,230
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
Dec. 27, 2014 04:00 PM EST Reads: 1,892
We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will w...
Dec. 27, 2014 02:00 PM EST Reads: 1,982
"ElasticBox is an enterprise company that makes it very easy for developers and IT ops to collaborate to develop, build and deploy applications on any cloud - private, public or hybrid," stated Monish Sharma, VP of Customer Success at ElasticBox, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 27, 2014 01:30 PM EST Reads: 1,860
The term culture has had a polarizing effect among DevOps supporters. Some propose that culture change is critical for success with DevOps, but are remiss to define culture. Some talk about a DevOps culture but then reference activities that could lead to culture change and there are those that talk about culture change as a set of behaviors that need to be adopted by those in IT. There is no question that businesses successful in adopting a DevOps mindset have seen departmental culture change, ...
Dec. 27, 2014 12:45 PM EST Reads: 1,735
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Ar...
Dec. 27, 2014 12:30 PM EST Reads: 2,474
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
Dec. 27, 2014 12:30 PM EST Reads: 1,964
The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large...
Dec. 27, 2014 12:00 PM EST Reads: 2,713
DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete...
Dec. 27, 2014 12:00 PM EST Reads: 1,808
The definition of IoT is not new, in fact it’s been around for over a decade. What has changed is the public's awareness that the technology we use on a daily basis has caught up on the vision of an always on, always connected world. If you look into the details of what comprises the IoT, you’ll see that it includes everything from cloud computing, Big Data analytics, “Things,” Web communication, applications, network, storage, etc. It is essentially including everything connected online from ha...
Dec. 27, 2014 12:00 PM EST Reads: 2,389
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
Dec. 27, 2014 11:30 AM EST Reads: 2,540
"SAP had made a big transition into the cloud as we believe it has significant value for our customers, drives innovation and is easy to consume. When you look at the SAP portfolio, SAP HANA is the underlying platform and it powers all of our platforms and all of our analytics," explained Thorsten Leiduck, VP ISVs & Digital Commerce at SAP, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 27, 2014 11:00 AM EST Reads: 1,962
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
Dec. 27, 2014 11:00 AM EST Reads: 7,185
SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, discussed how SAP and partners provide cloud and hybrid cloud solutions as well as real-time Big Data offerings that help companies of all sizes and industries run better. SAP launched an application challenge to award the most innovative SAP HANA and SAP HANA...
Dec. 27, 2014 11:00 AM EST Reads: 2,158