Home > Articles > Security > General Security and Privacy
General Security and Privacy
178 Items
Sort by Date | Title
- Vanish: Email that Disappears After Sending - A Review
- Oct 1, 2009
- Technology expert A. Lizard offers a how-to on Vanish, software the makes your files disappear forever.
|
- Software [In]security: BSIMM Begin
- Sep 24, 2009
- Gary McGraw introduces BSIMM Begin, a Web-based study focused on 40 of the 110 activities covered in the full Building Security In Maturity Model.
|
- Locking Down a Shared or Public PC with SteadyState
- Aug 28, 2009
- Eric Geier helps you discover how the free Microsoft SteadyState utility can help secure and manage a multiuser PC.
|
- Software [In]security: Attack Categories and History Prediction
- Aug 25, 2009
- Software security expert Gary McGraw describes how to divide attacks into four categories — and predict the attacks of tomorrow.
|
- What Is Surreptitious Software?
- Aug 11, 2009
- Christian Collberg and Jasvir Nagra discuss the basic techniques used to protect secrets stored in software.
|
- Software [In]security: Moving U.S. Cybersecurity Beyond Cyberplatitudes
- Jul 16, 2009
- Gary McGraw discusses how the current U.S. administration needs to make some important progress on cybersecurity rather than simply offering more platitudes.
|
- Tips to Secure Your Home Wi-Fi Network
- Jul 10, 2009
- Eric Geier points out important steps beyond encryption to secure your home Wi-Fi network.
|
- Top 10 Social Engineering Tactics
- Jun 11, 2009
- Andrew Whitaker explains some of these common social engineering tactics used today to gain unauthorized access or acquire confidential information.
|
- Online Security: A Quest to Be One Step Ahead of the Bad Guys
- May 29, 2009
- Linda Leung interviews security expert Jamey Heary about network security and the world of "white hats" versus "black hats."
|
- Deploying Disney: How Social Engineers Take Advantage of Childhood Lessons
- May 20, 2009
- Security consultant Chris Nickerson points out that teaching from animated characters may make it easier for social attackers to get at your mind.
|
- Information Security Bookshelf, Part 2 (2009 Edition)
- May 18, 2009
- Ed Tittel compiles a collection of pointers to useful and informative books on information security, part 2 of 2.
|
- Information Security Bookshelf, Part 1 (2009 Edition)
- May 8, 2009
- Ed Tittel compiles a collection of pointers to useful and informative books on information security.
|
- Passwords: So Important, Yet So Misused
- May 1, 2009
- Microsoft MVP and CISSP-ISSAP John Traenkenschuh illustrates basic password best practices.
|
- Software [In]security: Software Security Comes of Age
- Apr 16, 2009
- Gary McGraw details the continued growth of the software security industry, even in the face of worldwide recession.
|
- Advertising and Embedded Content
- Apr 14, 2009
- Greg Conti explores the risks associated with embedded content by focusing on Google’s advertising network and Google Analytics.
|
- Chained Exploits: Discover What Your Boss Is Looking At
- Apr 10, 2009
- Learn how to spy on your boss' net surfing habits — and protect yourself and your network from similar exploits.
|
- Are Private-Sector Organizations Responsible for Failing to Plan for Natural Disasters? (Part 1 of 3)
- Mar 16, 2009
- If you're the company's disaster-recovery planner, and you're caught unprepared for a natural disaster, are you at fault?
|
- Top 5 Security Resolutions for New PCs
- Jan 28, 2009
- Randy Nash discusses common security practices we should all follow when setting up new gear.
|
- Wherever You Go, There They Are: The Perils of Cross-Site Tracking
- Jan 23, 2009
- Greg Conti examines the practice of cross-site tracking and offers ways to block, or at least minimize, it.
|
- Software [In]security: Top 11 Reasons Why Top 10 (or Top 25) Lists Don’t Work
- Jan 13, 2009
- Gary McGraw explains why there’s more to software security than watching the bug parade march by.
|