Securius Newsletter

March 23, 2006
Volume 7, Number 2

Happy Days at the RSA Conference 2006

By Seth Ross, CISSP

These are boom days for the information security business in general and the encryption business in particular. The spirit of the boom was evident at the 15th annual gathering of cryptographers and the information security industry in San Jose, California.

The show bustled with security vendors and a record number of attendees: over 14,000. The dynamics of the boom have been driven by a variety of general factors: increased mobility and connectedness -- and thus risk -- and by a single piece of legislation: California’s data breach reporting law, SB1386. More...

Happy Days at RSA Conference 2006


Security Predictions for 2006

by Seth Ross

Security Predictions for 2006

Computer security is inherently unpredictable. Nonetheless, it’s possible (though risky) to extrapolate from current trends into the near future. More...

 

Newsletter Archive

Welcome to the Edge Volume 6, Number 3 2005-11-30 HTML TEXT

Attack of the Data Thieves Volume 6, Number 2 2005-08-23 HTML TEXT

Defeating the Rule of Possession Volume 6, Number 1 2005-01-25 HTML TEXT

Donating Old Equipment: Volume 5, Number 2 2004-12-27 HTML TEXT

RSA 2004: Magic Carpet Ride Volume 5, Number 1 2004-03-12 HTML TEXT

Creating a New Privacy Principle Volume 4, Number 7 2003-12-03 HTML TEXT

Again?
Volume 4, Number 6 2003-11-13 HTML TEXT

Snake Oil Encryption Volume 4, Number 5 2003-08-01 HTML TEXT

Common Criteria — Part 2 Volume 4, Number 4 2003-05-11 HTML TEXT

"Only for a moment" — RSA 2003 Volume 4, Number 3 2003-04-25 HTML TEXT

Common Criteria — Part 1 Volume 4, Number 2 2003-03-27 HTML TEXT

Security Through Usability Volume 4, Number 1 2003-02-24 HTML TEXT

Book Review — The Art of Deception Volume 3, Number 4 2002-12-23 HTML TEXT

Defending the National Strategy to Secure Cyberspace Volume 3, Number 3 2002-11-18 HTML TEXT

The Joys of Full Disk Encryption Volume 3, Number 2 2002-06-18 HTML TEXT

Windows EXPloitable
Volume 3, Number 1 2002-01-22 HTML TEXT

Strong Crypto Redux, AES, Password Recovery Volume 2, Number 8 2001-12-07 HTML TEXT

Strong Country, Strong Crypto
Volume 2, Number 7 2001-09-20 HTML TEXT

Information Wants to Be Free Volume 2, Number 6 2001-08-01 HTML TEXT

Secrets and Lies Volume 2, Number 5 2001-06-26 HTML TEXT

Crypto Reading List, Part I Volume 2, Number 4 2001-05-29 HTML TEXT

The War is Over Volume 2, Number 3 2001-04-20 HTML TEXT

The best things in life are free Volume 2, Number 2 2001-04-04 HTML TEXT

Learn to Forget Volume 2, Number 1 2001-02-05 HTML TEXT

Warm, Gushy Microsoft Volume 1, Number 11 2000-12-07 HTML TEXT

To Lose a Laptop Volume 1, Number 10 2000-10-19 HTML TEXT

RIP vs. Carnivore Volume 1, Number 9 2000-08-31 HTML TEXT

Carnivore, the Fourth Amendment,
and You
Volume 1, Number 8 2000-07-31 HTML TEXT

Attack of the Email Snoops Volume 1, Number 7 2000-06-26 HTML TEXT

Ten General Security Rules 6-10 Volume 1, Number 6 2000-05-22 HTML TEXT

General Security Rules 1-5 Volume 1, Number 5 2000-05-04 HTML TEXT

Attack of the Web Snoop Volume 1, Number 4 2000-03-23 HTML TEXT

Attack of the Packet Monkeys Volume 1, Number 3 2000-02-23 HTML TEXT

Where to Find the Y2K Bugs Volume 1, Number 2 2000-01-13 HTML TEXT

Watching the Watchers Volume 1, Number 1 1999-12-07 HTML TEXT
           

 



Copyright © 1999-2011 Seth T. Ross. All rights reserved.