Home > Articles > Security

Security

RSS Feed Subscribe to this topic  RSS details

720 Items

Sort by Date | Title

Software [In]security: BSIMM versus SAFECode and Other Kaiju Cinema
By Gary McGraw, Sammy Migues
Dec 26, 2011
Gary McGraw and Sammy Migues clarify the intended use of the Building Security In Maturity Model (BSIMM) and compare it to the SAFECode Practices methodology.
Secure Your Linux Workstation Now!
By John Traenkenschuh
Dec 12, 2011
Security writer John "Tränk" Traenkenschuh, CISSP-ISSAP, explores several easy-to-use security improvements you can make to your Linux workstation, using two very popular distributions as models: Ubuntu 11.10 and Fedora 15.
PKI: Broken, But Fixable
By David Chisnall
Nov 30, 2011
The public key infrastructure (PKI) used for securing the Web has recently been found to be much less secure than was previously thought. David Chisnall discusses some of the flaws in the design and some potential solutions.
Software [In]security: Third-Party Software and Security
By Gary McGraw, Brian Chess, Sammy Migues
Nov 30, 2011
How do you gauge the security of third-party code? A recent security conference examined that question, and Gary McGraw presents the findings in this article.
Secure Your Mac OS X System Now!
By John Traenkenschuh
Nov 15, 2011
John Traenkenschuh, gives his ideas on good security for your Mac OS X computer. Easy to configure and immediately useful, these ideas will help you secure your expensive device and very valuable information.
Software [In]security: Software Security Training
By Gary McGraw, Sammy Migues
Oct 31, 2011
Gary McGraw and Sammy Migues describe how training has changed, provide data showing it's importance, and explain why it's important to pick the right training for your organization's needs.
The Value of Layered Security
By David S. Linthicum
Oct 14, 2011
In this brief overview, David Linthicum describes how layered security works and how it can be a valuable tool in the fight against network intruders.
Security Blanket or Security Theater?
By Charles P. Pfleeger, Shari Lawrence Pfleeger
Oct 13, 2011
This chapter explains how to better identify true threats from accidents and measure your vulnerability to either.
Secunia PSI: The Best Software Update Tool You've Never Heard Of
By Ed Tittel
Oct 12, 2011
If you have multiple computers in various configurations, how can you keep all these systems and packages current with security updates? Ed Tittel recommends a handy free program that polices software, watching out for anything that's out of date.
Software [In]security: BSIMM3
By Gary McGraw, Brian Chess, Sammy Migues
Sep 27, 2011
BSIMM3 is the third iteration of the Building Security In Maturity Model (BSIMM) project, a tool used as a measuring stick for software security initiatives in the corporate world. Gary McGraw describes the BSIMM3 along with Brian Chess and Sammy Migues.
Prevent Wi-Fi Eavesdroppers from Hijacking Your Accounts
By Eric Geier
Sep 20, 2011
Eric Geier shows you how to protect your privacy when logging on to online accounts that don't always use secure connections, like Facebook, MySpace, Twitter, and Amazon.
Debunking Free Antivirus Myths
By Eric Geier
Sep 14, 2011
Eric Geier sheds some light on free antivirus programs and whether or not they can adequately protect your computer and data.
Software [In]security: Balancing All the Breaking with some Building
By Gary McGraw
Aug 30, 2011
Security expert Gary McGraw argues that the software security industry is favoring offense at the expense of defense, and that more proactive defense is needed.
The Scariest (Disaster) Book I Have Ever Read, Part III
By Leo Wrobel
Aug 17, 2011
The most terrifying weapon facing the U.S. may already be in our enemies hands. Are you prepared for the ultimate disaster? In Part III of his three-part series, author Leo Wrobel explains exactly which systems would be affected by an electromagnetic pulse, how they would be affected, and to what degree.
The Scariest (Disaster) Book I Have Ever Read, Part II
By Leo Wrobel
Aug 10, 2011
The most terrifying weapon facing the U.S. may already be in our enemies hands. Are you prepared for the ultimate disaster? In Part II of his three-part series, author Leo Wrobel explains how you can best prepare yourself for an electromagnetic pulse.
The Scariest (Disaster) Book I Have Ever Read, Part I
By Leo Wrobel
Aug 4, 2011
The most terrifying weapon facing the U.S. may already be in our enemies' hands. Are you prepared for the ultimate disaster? In Part I of his three-part series, author Leo Wrobel explains how an electromagnetic pulse can damage the world as we know it today.
Securing a Web App at the Last Minute
By Ajay Gupta
Jul 26, 2011
While consumers and the media are increasingly aware of the risks to confidential information over web apps, firms still tend to focus on development, leaving data security until just before the go-live date. Ajay Gupta points out that last-minute steps are available to improve the security of your apps before launching them onto the Internet.
Software [In]security: Software Security Zombies
By Gary McGraw
Jul 21, 2011
Software security expert Gary McGraw reviews some of the most important security concepts — before they eat your (network's) brains.
Cisco Firewall Configuration Fundamentals
By Alexandre M.S.P. Moraes
Jul 8, 2011
This chapter describes the configuration fundamentals for IOS and ASA-based firewalls, highlighting the similarities between the product families.
Software [In]security: Partly Cloudy with a Chance of Security
By Gary McGraw
Jun 17, 2011
Security expert Gary McGraw provides some issues to consider when it comes to adoption of cloud services and their impact on security in your organization.

<< < Prev Page 1 2 3 4 5 Next >