Home > Articles > Security
Security
722 Items
Sort by Date | Title
- Moving to WPA/WPA2-Enterprise Wi-Fi Encryption
- Apr 9, 2010
- Wi-Fi networks in businesses should be using the Enterprise mode of WPA or WPA2 encryption. Eric Geier shows you how to move from the Personal (PSK) mode to the Enterprise (RADIUS) mode.
|
- Securing Your Wi-Fi Hotspot Sessions
- Mar 30, 2010
- Eric Geier shares tips to keep your email, documents, and computer safe while using Wi-Fi hotspots.
|
- Software [In]security: The Smart (Electric) Grid and Dumb Cybersecurity
- Mar 26, 2010
- Security expert Gary McGraw explains why the rush to upgrade our power grid may lead to security vulnerabilities in critical infrastructure.
|
- Software [In]security: What Works in Software Security
- Feb 26, 2010
- 15 of the 110 activities in the BSIMM are very commonly observed. Gary McGraw, Brian Chess, and Sammy Migues list and explain these activities.
|
- Cisco ASA Authentication, Authorization, and Accounting Network Security Services
- Jan 28, 2010
- This chapter provides an explanation of the configuration and troubleshooting of Cisco ASA-supported authentication, authorization, and accounting network security services.
|
- Software [In]security: Cargo Cult Computer Security
- Jan 28, 2010
- Gary McGraw argues that the time is right to turn to real science to combat the "Cargo Cult" mentality of the software security field.
|
- Chained Exploits: How Hackers Combine Attacks to Hack You
- Jan 27, 2010
- Security expert Andrew Whitaker explains the hacker mentality and points out how hackers combine multiple exploits to achieve their goals.
|
- Understanding the New A+ Security Objectives
- Jan 6, 2010
- Mark Edward Soper provides a useful overview of the new Security objectives in both of the A+ Certification exams.
|
- System Protection with SMF
- Dec 22, 2009
- This chapter shows you how to configure four programs—NFS, IP filter, FTP, and the Apache2 Web server — as SMF services.
|
- Software [In]security: You Really Need a Software Security Group
- Dec 21, 2009
- Gary McGraw explains why having a software security group is necessary for a software security initiative.
|
- Top 4 Software Development Protection Techniques and How to Defeat Them
- Dec 7, 2009
- Knowing weaknesses in different protection methods can help you choose the best techniques to safeguard your intellectual property.
|
- Exploiting phpMyadmin: How to Get root in 15 Easy Steps
- Nov 20, 2009
- Security expert Seth Fogie provides you with a real-world illustration of a how a simple overlooked account can lead to root access.
|
- Software [In]security: BSIMM Europe
- Nov 10, 2009
- Security expert Gary McGraw and team introduce BSIMM Europe and compare some of its initial results to the original BSIMM data.
|
- Software [In]security: Startup Lessons
- Oct 22, 2009
- Gary McGraw discusses the seven lessons he's learned through his startup years at Cigital.
|
- Vanish: Email that Disappears After Sending - A Review
- Oct 1, 2009
- Technology expert A. Lizard offers a how-to on Vanish, software the makes your files disappear forever.
|
- Software [In]security: BSIMM Begin
- Sep 24, 2009
- Gary McGraw introduces BSIMM Begin, a Web-based study focused on 40 of the 110 activities covered in the full Building Security In Maturity Model.
|
- Locking Down a Shared or Public PC with SteadyState
- Aug 28, 2009
- Eric Geier helps you discover how the free Microsoft SteadyState utility can help secure and manage a multiuser PC.
|
- Software [In]security: Attack Categories and History Prediction
- Aug 25, 2009
- Software security expert Gary McGraw describes how to divide attacks into four categories — and predict the attacks of tomorrow.
|
- What Is Surreptitious Software?
- Aug 11, 2009
- Christian Collberg and Jasvir Nagra discuss the basic techniques used to protect secrets stored in software.
|
- Proactive Intrusion Prevention and Response via Attack Graphs
- Jul 27, 2009
- This chapter describes the latest advances in an innovative proactive approach to network security called Topological Vulnerability Analysis.
|