Home > Blogs > Security > Software Security

Blog Posts about Software Security

RSS Feed Subscribe  RSS details

John  Traenkenschuh

Is Windows 10 Enough: The Cloud, Part I

By John TraenkenschuhAug 12, 2015

The Cloud is mighty!  All Hail the Cloud, The Slayer of PCs!

John  Traenkenschuh

Windows 10: Is It Enough?

By John TraenkenschuhAug 10, 2015

Windows 8 was envisioned as a desktop OS capable of fighting the consumers' fling with Tablets. Now that the war is against Tablets AND PC's, can Windows 10 draw consumers to it?

Brad Yale

The Purchase of Influence

By Brad YaleMay 12, 2015

This will be a quick post about the changing times and how, with the purchase of a large-scale media company, the death of free speech is ever nearing.

John  Traenkenschuh

Please make my job easier

By John TraenkenschuhMar 27, 2015

Traenk mulls over his ethical hacking job and remote access technologies. Does user convenience make unseen threats more real?

John  Traenkenschuh

Thank You, SANS.org!

By John TraenkenschuhFeb 12, 2015

No matter what the need, few security organizations are as dedicated to helping us InfoSec Pros as SANS.

John  Traenkenschuh

The Enemy Within

By John TraenkenschuhFeb 8, 2015

Long ago, Traenk read about new attacks, attacks modeled after biological attacks.  Those were viruses; what new comes?

John  Traenkenschuh

Leap second--Are You Ready?

By John TraenkenschuhJan 19, 2015

Two Grandfather clocks--what can you do with those?  How high-tech are those?

John  Traenkenschuh

Risk Management Versus Vulnerability Analysis

By John TraenkenschuhOct 21, 2014

Vulnerability Analysis is deceptively easy. Security Red Teaming requires more than that.

Brad Yale

How the Internet Works: A Call for Personal Security

By Brad YaleOct 13, 2014

It's very easy, after reading "The Snappening" Snapchat security breach news, to determine fault lies with users. It would be very easy and convenient to blame the leak not on the leakers, but on the users who sent sexually explicit materials to friends, lovers and strangers. This conclusion is easy to draw yet, it only skims the surface of the true issue at hand.  

Whatever you think of the materials leaked, the larger issue at play in "The Snappening" is how the public relates to, understands and uses public Internet architectures. If anything, "The Snappening" should serve as a beacon call for greater Internet security practice enlightenment. 

In this version of "How the Internet Works" we cover public Cloud architectures and the need for increased Internet security practices learning.  

Brad Yale

Mobile Malware and Fake Apps: Hong Kong, China and The New York Times

By Brad YaleOct 2, 2014

For the past week or so, Hong Kong has erupted with peaceful demonstrations advocating for the ousting of the Chinese premiere and the right to peacefully and openly elect his replacement. While the Chinese premiere, Xi Jinping, looks to be going nowhere one thing has become clear - the mobile devices and Internet connections which helped to grow the nightly demonstrations are quietly suffering an inward meta problem - malware, viruses and fake applications.

As mobile platforms become more prominent and are used more robustly to organize, carry out financial transactions and conduct daily personal business, the time has come to address mobile malware and fake applications.

John  Traenkenschuh

How Long?

By John TraenkenschuhJul 29, 2014

Traenk kept his Windows system from the Internet, from even starting, for some 45 days.  A lot can de-evolve in 45 days...  Honestly, how long does it take before your system becomes very vulnerable and how long must we wait for new Windows components?  Will Windows 9 fix the issues?

John  Traenkenschuh

Ethical Hacker

By John TraenkenschuhJul 29, 2014

It's time to take back the term hacker from the wanna-be's...

Page 1 2 3 4 5 Next >