It’s that time of the week again: the time where we take a look at what local security bloggers have been up to. You can take a look at what local security bloggers have been up to but if you can’t get enough of the local security scene, check out our NovaInfosec Twits listfor even more great security blogs and people to follow on Twitter.
As always feel free to check out what local security bloggers have been up to and also be sure to follow myself (@nathiet), @grecs, and @novainfosec on Twitter if you want to know more about what’s going on in the local security community during the week. Without further ado … here are the top picks for this week.
#3- Mobile Security “Average” Practices: With the increasing importance of smartphones and tablets in the lives of consumers and workers has made mobile devices more attractive to attackers, @grecs is offering some suggestions for your “average” everyday smartphone users to protect themselves from security risks aimed at smartphones, tablets and apps. Click here to find out what @grecs has suggested.
2- My Personal War Against Overuse of Memory Corruption Bugs: “Memory corruption bugs IMO are a bad long term return on investment.” Valsmith shares why “several years ago decided to pull back from the memory corruption rat race” and also shares his method of breaking into computers. Click here to find out what method Valsmith uses.
#1- Scaling Risk Management: “I don’t think that anybody would argue that risk management is important.” Ben Tomhave challenges us to scale risk management practices to fit our organizations. “In thinking about how best to scale risk management practices I consider a number of different approaches. One place I started was with CMMI to see if there was a logical mapping that could be done in a useful way.” Click here to learn more about Scaling Risk Management and Ben Tomhave’s thoughts.