Home > Articles > Security > General Security and Privacy

General Security and Privacy

RSS Feed Subscribe to this topic  RSS details

178 Items

Sort by Date | Title

Secure Your Embedded Systems Now!
By John Traenkenschuh
Oct 24, 2013
John Traenkenschuh explores the somewhat hidden world of embedded computing and its emerging security issues.
Secure Your Android Kindle or Nook Tablet Now!
By John Traenkenschuh
Oct 3, 2013
Tablet security is becoming increasingly important. Are you ready? John Traenkenschuh demonstrates how to secure your Nook HD+ or Kindle Fire HD tablet, using a mix of security tools and settings.
Managing Your Computer and Internet Passwords
By Michael Miller
Aug 27, 2013
Michael Miller shows you how to create more secure passwords - and how to remember and manage them all.
Recovering and Securing Network and Internet Passwords
By Eric Geier
Oct 8, 2012
Security expert Eric Geier shows you how to find or capture your network, browser, and email passwords, which is useful if you’ve forgotten them. Plus, he explores password vulnerabilities and teaches you how to protect against them.
An Insider's Look into the 2012 Mid-Atlantic Collegiate Cyber Defense Challenge
By Brad Bowers
May 15, 2012
Brad Bowers takes an insider look into the 2012 Mid-Atlantic Collegiate Cyber Defense Challenge that faces off hardened penetration testers against defending college teams in this annual cyber attack and defend competition.
Protecting Your Network from the Wi-Fi Protected Setup Security Hole
By Eric Geier
Mar 12, 2012
Even if you’ve encrypted and secured your wireless network with Wi-Fi Protected Access (WPA or WPA2), a security hole affecting most wireless routers may make it fairly easy for those with the right tools to hack your network and connect. Eric Geier shows how to prevent this and protect your network.
Cyber Stalking, Fraud, and Abuse
By William (Chuck) Easttom
Feb 1, 2012
This chapter explores what the various major types of internet fraud are, what the law says, and what you can do to protect yourself.
Software [In]security: vBSIMM Take Two (BSIMM for Vendors Revised)
By Gary McGraw, Sammy Migues
Jan 26, 2012
Gary McGraw and Sammy Migues introduce a revised, compact version of the BSIMM for vendors called vBSIMM, which can be thought of as a foundational security control for vendor management of third-party software providers.
Secure Your iPad 2 Now!
By John Traenkenschuh
Dec 28, 2011
Is your iPad 2 reasonably secured right out of the box? Maybe not. Security specialist John Traenkenschuh, CISSP-ISSAP, provides sensible, flexible security patterns for the iPad 2.
Software [In]security: BSIMM versus SAFECode and Other Kaiju Cinema
By Gary McGraw, Sammy Migues
Dec 26, 2011
Gary McGraw and Sammy Migues clarify the intended use of the Building Security In Maturity Model (BSIMM) and compare it to the SAFECode Practices methodology.
Secure Your Linux Workstation Now!
By John Traenkenschuh
Dec 12, 2011
Security writer John "Tränk" Traenkenschuh, CISSP-ISSAP, explores several easy-to-use security improvements you can make to your Linux workstation, using two very popular distributions as models: Ubuntu 11.10 and Fedora 15.
PKI: Broken, But Fixable
By David Chisnall
Nov 30, 2011
The public key infrastructure (PKI) used for securing the Web has recently been found to be much less secure than was previously thought. David Chisnall discusses some of the flaws in the design and some potential solutions.
Software [In]security: Third-Party Software and Security
By Gary McGraw, Brian Chess, Sammy Migues
Nov 30, 2011
How do you gauge the security of third-party code? A recent security conference examined that question, and Gary McGraw presents the findings in this article.
Secure Your Mac OS X System Now!
By John Traenkenschuh
Nov 15, 2011
John Traenkenschuh, gives his ideas on good security for your Mac OS X computer. Easy to configure and immediately useful, these ideas will help you secure your expensive device and very valuable information.
Software [In]security: Software Security Training
By Gary McGraw, Sammy Migues
Oct 31, 2011
Gary McGraw and Sammy Migues describe how training has changed, provide data showing it's importance, and explain why it's important to pick the right training for your organization's needs.
Security Blanket or Security Theater?
By Charles P. Pfleeger, Shari Lawrence Pfleeger
Oct 13, 2011
This chapter explains how to better identify true threats from accidents and measure your vulnerability to either.
Secunia PSI: The Best Software Update Tool You've Never Heard Of
By Ed Tittel
Oct 12, 2011
If you have multiple computers in various configurations, how can you keep all these systems and packages current with security updates? Ed Tittel recommends a handy free program that polices software, watching out for anything that's out of date.
Software [In]security: BSIMM3
By Gary McGraw, Brian Chess, Sammy Migues
Sep 27, 2011
BSIMM3 is the third iteration of the Building Security In Maturity Model (BSIMM) project, a tool used as a measuring stick for software security initiatives in the corporate world. Gary McGraw describes the BSIMM3 along with Brian Chess and Sammy Migues.
Prevent Wi-Fi Eavesdroppers from Hijacking Your Accounts
By Eric Geier
Sep 20, 2011
Eric Geier shows you how to protect your privacy when logging on to online accounts that don't always use secure connections, like Facebook, MySpace, Twitter, and Amazon.
Debunking Free Antivirus Myths
By Eric Geier
Sep 14, 2011
Eric Geier sheds some light on free antivirus programs and whether or not they can adequately protect your computer and data.

Page 1 2 3 4 5 Next >