<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-12784672</id><updated>2024-03-08T06:02:18.092+02:00</updated><category term="management"/><category term="market"/><category term="opinion"/><category term="predictions"/><category term="report"/><category term="risk"/><category term="trends"/><title type='text'>Security Market Wrap</title><subtitle type='html'>Interesting, topical &amp; pertinent IT security industry developments for executive &amp; IT management, analysts, strategists, consultants &amp; IT proffesionals who wish to keep abreast of events that could shape the security landscape.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default?alt=atom'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default?alt=atom&amp;start-index=26&amp;max-results=25'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>421</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-12784672.post-641690538278190973</id><published>2008-05-15T15:19:00.001+02:00</published><updated>2008-05-15T15:21:29.427+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="management"/><category scheme="http://www.blogger.com/atom/ns#" term="report"/><category scheme="http://www.blogger.com/atom/ns#" term="risk"/><title type='text'>Management group warns CEO&#39;s of data-breach risks</title><summary type="text">Top-level managers and chief executives often do not realise the impact that IT-security incidents can have on their organisations, according to influential group the British-North American Committee.In a report entitled Cyber Attack: A Risk Management Primer for CEOs and Directors, launched on Wednesday, the British-North American Committee (BNAC) said that chief executives underestimate the </summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/641690538278190973/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/641690538278190973?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/641690538278190973'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/641690538278190973'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2008/05/management-group-warns-ceos-of-data.html' title='Management group warns CEO&#39;s of data-breach risks'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12784672.post-7435475482914237322</id><published>2008-05-15T10:37:00.004+02:00</published><updated>2008-05-15T11:22:19.069+02:00</updated><title type='text'>Cisco IOS Timebomb - one step closer...</title><summary type="text">The IOS vulnerability threat just ratcheted up a notch with another first - someone has actually developed a malicious rootkit for any version of IOS that runs on Cisco&#39;s routers, a development that has placed increasing scrutiny on the routers that make up the majority of the Internet and corporate networking infrastructure. The researcher will unveil his work on May 22 at the EuSecWest </summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/7435475482914237322/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/7435475482914237322?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/7435475482914237322'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/7435475482914237322'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2008/05/cisco-ios-timebomb-one-step-closer.html' title='Cisco IOS Timebomb - one step closer...'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12784672.post-3028824120695321048</id><published>2008-04-11T18:39:00.004+02:00</published><updated>2008-04-11T18:46:56.115+02:00</updated><title type='text'>Power Grid hacked in no time</title><summary type="text">Researchers who launched an experimental cyber attack caused a generator to self-destruct, alarming the federal government and electrical industry about what might happen if such an attack were carried out on a larger scale.Some experts fear bigger, coordinated attacks could cause widespread damage to electric infrastructure that could take months to fix. In a previously classified video of the </summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/3028824120695321048/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/3028824120695321048?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/3028824120695321048'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/3028824120695321048'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2008/04/power-grid-hacked-in-no-time.html' title='Power Grid hacked in no time'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12784672.post-9199047410886843880</id><published>2008-02-28T09:03:00.004+02:00</published><updated>2008-02-28T09:26:08.706+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="market"/><category scheme="http://www.blogger.com/atom/ns#" term="opinion"/><category scheme="http://www.blogger.com/atom/ns#" term="predictions"/><category scheme="http://www.blogger.com/atom/ns#" term="trends"/><title type='text'>How recession proof is IT security?</title><summary type="text">Leading economists have recently increased their projections of a likelihood of an economic recession in the United Kingdom, Japan and the United States. These countries together comprise 42% of the world&#39;s gross domestic product (GDP). Even though many other economies are growing quite vigorously it is inevitable they will feel the effects and themselves could be facing difficult economic times </summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/9199047410886843880/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/9199047410886843880?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/9199047410886843880'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/9199047410886843880'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2008/02/how-recession-proof-is-it-security.html' title='How recession proof is IT security?'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12784672.post-5690680260441105623</id><published>2008-02-26T17:56:00.002+02:00</published><updated>2008-02-26T18:02:49.346+02:00</updated><title type='text'>Top 10 cyber security menaces for 2008</title><summary type="text"></summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/5690680260441105623/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/5690680260441105623?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/5690680260441105623'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/5690680260441105623'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2008/02/top-10-cyber-security-menaces-for-2008.html' title='Top 10 cyber security menaces for 2008'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJDIw7INASpYLLfFhExP2nRb__0vunuDWkRHIxi2hE5mZUxBeJHMKmr3aeCRi9r3YWo7ekVlYlYMYerzZL16RNIOWHJjJi3K4de6A02ERvvfRSDR3UhJ-VCOW_qtUkBMRkvO6Bag/s72-c/sans.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12784672.post-6399491309261493567</id><published>2007-10-08T17:15:00.000+02:00</published><updated>2007-10-08T17:21:21.814+02:00</updated><title type='text'>2007 E-Crime Watch Survey</title><summary type="text"></summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/6399491309261493567/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/6399491309261493567?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/6399491309261493567'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/6399491309261493567'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2007/10/2007-e-crime-watch-survey.html' title='2007 E-Crime Watch Survey'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhucZbbUmc_wqVbguHGkA6ccf2fczLNMITHqBG2w65DFkkQDyy-vsaFBaUSDo5F5fEdbBgvYAhvwnXKc76-OGosSSltjPgA9AKkIYUkGj2yE3erVRvoeEqIgmjE6Ruy9ABGHBLZrg/s72-c/ThreatLandscape.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12784672.post-117637083641337870</id><published>2007-04-12T11:20:00.000+02:00</published><updated>2007-04-12T11:59:03.996+02:00</updated><title type='text'>US Data Breach disclosures top 150M records</title><summary type="text">I have concluded an analysis of the latest data from the not-for-profit Privacy Rights Clearinghouse. Since February 2005 they have been recording a Chronology of Data Breaches that have been made public since the very first US Data Breach disclosure laws have come into effect.Whilst they are the only worldwide organisation to do this sort of thing (and I&#39;m pretty sure that the US data breach </summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/117637083641337870/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/117637083641337870?isPopup=true' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/117637083641337870'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/117637083641337870'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2007/04/us-data-breach-disclosures-top-150m.html' title='US Data Breach disclosures top 150M records'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12784672.post-115640967335813168</id><published>2006-08-24T10:01:00.000+02:00</published><updated>2006-08-24T23:31:35.743+02:00</updated><title type='text'>IBM&#39;s acquisition of ISS for $1.6Bn</title><summary type="text">OPINION PIECEIt was inevitable that ISS would eventually be acquired. As network, systems and security management are all converging, and security technology starts becoming assimilated by the gorillas into networking fabric (Cisco) and operations systems (Microsoft), and the lines between security &amp; network management start to blur, it stands to reason that ISS on its own would eventually be </summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/115640967335813168/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/115640967335813168?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/115640967335813168'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/115640967335813168'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2006/08/ibms-acquisition-of-iss-for-16bn.html' title='IBM&#39;s acquisition of ISS for $1.6Bn'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12784672.post-115443463597387479</id><published>2006-08-01T11:17:00.000+02:00</published><updated>2006-08-01T14:17:16.286+02:00</updated><title type='text'>The challenge of Cisco Network Device Patching</title><summary type="text">We haven&#39;t posted something about Ciscogate for quite a while now. However I came across this BlackHat posting dated April 25th 2006 which was quite interesting. It was written by a BlackHat member that works for Gartner.Traditional, monolithic IOS is a proprietary operating system that runs Cisco routing and most switching devices. It has required an image replacement and reboot to upgrade. IOS </summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/115443463597387479/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/115443463597387479?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/115443463597387479'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/115443463597387479'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2006/08/challenge-of-cisco-network-device.html' title='The challenge of Cisco Network Device Patching'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12784672.post-115442382077092053</id><published>2006-08-01T10:51:00.000+02:00</published><updated>2006-08-01T11:17:01.540+02:00</updated><title type='text'>Happy Birthday, SOX</title><summary type="text">On July 30th, SOX turned four years old. Here is an interesting list of stories associated with SOX over time:Happy birthday, SOXSOX clock ticking for overseas businesses$6Bn US bill for Sarbanex OxleySecurity dominates SOX product spendSOX may push public firms to go privateSOX is too little, too late?Sarbox worsens your security stanceSOX weighs heavily on public companiesQualcomm shares 2 </summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/115442382077092053/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/115442382077092053?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/115442382077092053'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/115442382077092053'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2006/08/happy-birthday-sox.html' title='Happy Birthday, SOX'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12784672.post-115442224666506138</id><published>2006-08-01T10:35:00.000+02:00</published><updated>2006-08-01T10:50:46.683+02:00</updated><title type='text'>CISO&#39;s overpromoted technologists</title><summary type="text">An interesting 4 part series by Network World on the challenges faced by CISO&#39;s (Chief Information Security Officers) trying to promote and sell the merits of information security internally in their organisations. CISO&#39;s are having a hard time getting their ideas accepted from the board level down and are just &quot;overpromoted technologists&quot;.Consultants suggest that the easiest and best way to </summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/115442224666506138/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/115442224666506138?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/115442224666506138'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/115442224666506138'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2006/08/cisos-overpromoted-technologists.html' title='CISO&#39;s overpromoted technologists'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12784672.post-115331699548625378</id><published>2006-07-19T15:44:00.000+02:00</published><updated>2006-07-19T15:49:55.723+02:00</updated><title type='text'>Token-based security cracked</title><summary type="text">Two-factor security tokens have always been thought of as the solution to password security woes. But now history has been made with man-in-the-middle attacks being used for the first time to circumvent token security being rolled out by banks at huge costs.Over the past few weeks, approximately 35 phishing Web sites have been set up that use the new attack. They attempt to trick users into </summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/115331699548625378/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/115331699548625378?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/115331699548625378'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/115331699548625378'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2006/07/token-based-security-cracked.html' title='Token-based security cracked'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12784672.post-115271657025280755</id><published>2006-07-12T16:54:00.000+02:00</published><updated>2006-07-12T17:02:50.253+02:00</updated><title type='text'>VARs &amp; Integrators waking up to NAC action</title><summary type="text">The first time solution provider Chris Labatt-Simon mentioned network access control to a customer three years ago, the executive was so stunned by the cost and complexity of putting a client on every single machine in his corporate network that he actually burst out laughing. But a few weeks later, after the same customer&#39;s network was brought to its knees by a worm introduced from a </summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/115271657025280755/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/115271657025280755?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/115271657025280755'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/115271657025280755'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2006/07/vars-integrators-waking-up-to-nac.html' title='VARs &amp; Integrators waking up to NAC action'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12784672.post-115270140528714858</id><published>2006-07-12T10:26:00.000+02:00</published><updated>2006-07-12T16:52:22.140+02:00</updated><title type='text'>A chronological take on the EMC/RSA Deal</title><summary type="text">OPINION PIECEA lot is floating around on the Internet about this $2.1Bn aquisition. Some are for it and some are against it. EMC stock has taken a hammering and the management of both companies are having to answer a lot of tricky questions. See EMC/RSA aquisition draws mixed reviews.The main drivers for Storage companies wanting to get into security (such as this aquisition) or Security </summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/115270140528714858/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/115270140528714858?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/115270140528714858'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/115270140528714858'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2006/07/chronological-take-on-emcrsa-deal.html' title='A chronological take on the EMC/RSA Deal'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12784672.post-115162475977446963</id><published>2006-06-30T01:40:00.000+02:00</published><updated>2006-06-30T03:24:23.240+02:00</updated><title type='text'>EMC to aquire RSA Security</title><summary type="text">EMC late Thursday confirmed it plans to acquire RSA Security for some $2.1 billion.Under terms of the deal, Hopkinton, Mass.-based storage giant EMC will pay $28 a share for RSA, New Bedford, Mass. The companies anticipate the acquisition will close late in the third quarter or early in the fourth quarter, subject to regulatory approvals and other conditions.The deal is the third large-scale </summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/115162475977446963/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/115162475977446963?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/115162475977446963'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/115162475977446963'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2006/06/emc-to-aquire-rsa-security.html' title='EMC to aquire RSA Security'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12784672.post-115092209596596638</id><published>2006-06-21T22:21:00.000+02:00</published><updated>2006-06-21T22:54:01.880+02:00</updated><title type='text'>NAC market gets crowded</title><summary type="text">You can always tell something big is brewing that will shape our lives in security when the vendor market gets crowded with solutions before standards have been shaped. These 20 companies are giving Cisco Systems and Microsoft a run for their money by bringing network access control (NAC) products to market. The crowded market, coupled with gorillas like Cisco and Microsoft promoting propriatary </summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/115092209596596638/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/115092209596596638?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/115092209596596638'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/115092209596596638'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2006/06/nac-market-gets-crowded.html' title='NAC market gets crowded'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12784672.post-115089977977264520</id><published>2006-06-21T16:11:00.000+02:00</published><updated>2006-06-21T16:22:59.803+02:00</updated><title type='text'>We will be back shortly</title><summary type="text">Work pressure has resulted in a lengthy pause of postings, but we will be back shortly with three knowledgeable contributors to content instead of just myself.The 1st 5 months was a worthwhile experiment and vindicated the usefuleness of this blog to over 300 internal Dimension Data security line of business staff as well as over 500 other regular readers, so consider Phase-I complete and </summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/115089977977264520/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/115089977977264520?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/115089977977264520'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/115089977977264520'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2006/06/we-will-be-back-shortly.html' title='We will be back shortly'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12784672.post-113998600134404685</id><published>2006-02-15T08:25:00.000+02:00</published><updated>2006-02-15T08:52:18.526+02:00</updated><title type='text'>RSA 2006 Day-1</title><summary type="text">The most noticeable trends I observed today at the Exhibition centre was Apple iPod giveaways and NAC appliances. And of course over 400 exhibitors and 14,000 conference attendees.The keynotes were delivered by Bill Gates, Art Coviello and Scott McNealy. Gates took opportunity to demonstrate new security features in Vista and signalled the death of passwords as security measures. Nothing </summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/113998600134404685/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/113998600134404685?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/113998600134404685'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/113998600134404685'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2006/02/rsa-2006-day-1.html' title='RSA 2006 Day-1'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12784672.post-113986204446635500</id><published>2006-02-13T22:17:00.000+02:00</published><updated>2006-02-13T22:20:44.466+02:00</updated><title type='text'>SEM enters mainstream in 2006</title><summary type="text">Faced with regulatory compliance requirements and grueling audits, network managers are turning increasingly to security event management systems (SEM) to detect when policies have been breached.SEM products - from e-Security, Network Intelligence, ScriptLogic, TriGeo and others - have data aggregation and event correlation features similar to those in network management software. These products </summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/113986204446635500/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/113986204446635500?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/113986204446635500'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/113986204446635500'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2006/02/sem-enters-mainstream-in-2006.html' title='SEM enters mainstream in 2006'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12784672.post-113986175275617835</id><published>2006-02-13T22:12:00.000+02:00</published><updated>2006-02-13T22:15:52.760+02:00</updated><title type='text'>NAC confusion reigns</title><summary type="text">Security products that perform health checks on desktop and laptop computers will be in abundance at this week&#39;s RSA Conference. But industry leaders Cisco Systems and Microsoft remain mum about a long-promised integration of their dominant network access control architectures, leaving IT managers wondering whether to go with one of the solutions that is already available or wait for an </summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/113986175275617835/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/113986175275617835?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/113986175275617835'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/113986175275617835'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2006/02/nac-confusion-reigns.html' title='NAC confusion reigns'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12784672.post-113986153750709908</id><published>2006-02-13T21:57:00.000+02:00</published><updated>2006-02-13T22:12:17.543+02:00</updated><title type='text'>Retailer in massive breach</title><summary type="text">A data security breach involving an undisclosed California retail company has prompted Bank of America to cancel the debit cards of numerous customers, a spokesman for the US&#39; largest bank said on Tuesday.Investigators have traced a recent rash of fraudulent debit-card transactions across the globe to the theft of as many as 200,000 debit records from an office-supply store in California, </summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/113986153750709908/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/113986153750709908?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/113986153750709908'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/113986153750709908'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2006/02/retailer-in-massive-breach.html' title='Retailer in massive breach'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12784672.post-113986064755392519</id><published>2006-02-13T21:40:00.000+02:00</published><updated>2006-02-13T21:57:27.556+02:00</updated><title type='text'>French bank accounts hit by Russian virus gangs</title><summary type="text">Russian criminal gangs have used sophisticated virus programs to steal more than £600,000 from personal bank accounts across France.The fraud was uncovered after police arrested a dozen Russian gang members and several Ukrainians in Moscow and St Petersburg, according to a report in the Guardian. Victims lost money after their computers became infected with a “sleeper virus&quot; when they opened </summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/113986064755392519/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/113986064755392519?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/113986064755392519'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/113986064755392519'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2006/02/french-bank-accounts-hit-by-russian.html' title='French bank accounts hit by Russian virus gangs'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12784672.post-113986014313852122</id><published>2006-02-13T21:36:00.000+02:00</published><updated>2006-02-13T21:49:03.236+02:00</updated><title type='text'>RSA Conference 2006</title><summary type="text">The security industry converges at the annual RSA Conference this week, an event that&#39;s moved far beyond its origins as a get-together for cryptogeeks and other insiders. Though still organized by RSA Security, a company with its roots in cryptography, the confab has developed into a showcase for security companies and an annual gathering for IT professionals. This year is the 15th anniversary of</summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/113986014313852122/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/113986014313852122?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/113986014313852122'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/113986014313852122'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2006/02/rsa-conference-2006.html' title='RSA Conference 2006'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12784672.post-113933240854850997</id><published>2006-02-07T19:10:00.000+02:00</published><updated>2006-02-07T19:13:28.583+02:00</updated><title type='text'>Virus Delays Stock Trading in Russia</title><summary type="text">MOSCOW - Trading was suspended for an hour at Russia&#39;s main stock exchange because of a computer virus, officials said Friday. Data processing at the Russian Trading Systems, or RTS, was paralyzed late Thursday as specialists rushed to localize the virus and switch off the infected computer, according to the exchange. No permanent damage was caused and no information was lost.According to RTS </summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/113933240854850997/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/113933240854850997?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/113933240854850997'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/113933240854850997'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2006/02/virus-delays-stock-trading-in-russia.html' title='Virus Delays Stock Trading in Russia'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-12784672.post-113933181695640868</id><published>2006-02-07T18:55:00.000+02:00</published><updated>2006-02-07T19:03:36.956+02:00</updated><title type='text'>Cartoon : Security Surge</title><summary type="text">Categories : 1cartoon</summary><link rel='replies' type='application/atom+xml' href='http://secure-o-gram.blogspot.com/feeds/113933181695640868/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/12784672/113933181695640868?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/113933181695640868'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/12784672/posts/default/113933181695640868'/><link rel='alternate' type='text/html' href='http://secure-o-gram.blogspot.com/2006/02/cartoon-security-surge.html' title='Cartoon : Security Surge'/><author><name>Dwaine</name><uri>http://www.blogger.com/profile/12997537303866512369</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>