Home > Articles > Security

Security

722 Items

Sort by Date | Title

Moving to WPA/WPA2-Enterprise Wi-Fi Encryption
Apr 9, 2010
Wi-Fi networks in businesses should be using the Enterprise mode of WPA or WPA2 encryption. Eric Geier shows you how to move from the Personal (PSK) mode to the Enterprise (RADIUS) mode.
Securing Your Wi-Fi Hotspot Sessions
Mar 30, 2010
Eric Geier shares tips to keep your email, documents, and computer safe while using Wi-Fi hotspots.
Software [In]security: The Smart (Electric) Grid and Dumb Cybersecurity
Mar 26, 2010
Security expert Gary McGraw explains why the rush to upgrade our power grid may lead to security vulnerabilities in critical infrastructure.
Software [In]security: What Works in Software Security
Feb 26, 2010
15 of the 110 activities in the BSIMM are very commonly observed. Gary McGraw, Brian Chess, and Sammy Migues list and explain these activities.
Cisco ASA Authentication, Authorization, and Accounting Network Security Services
Jan 28, 2010
This chapter provides an explanation of the configuration and troubleshooting of Cisco ASA-supported authentication, authorization, and accounting network security services.
Software [In]security: Cargo Cult Computer Security
Jan 28, 2010
Gary McGraw argues that the time is right to turn to real science to combat the "Cargo Cult" mentality of the software security field.
Chained Exploits: How Hackers Combine Attacks to Hack You
Jan 27, 2010
Security expert Andrew Whitaker explains the hacker mentality and points out how hackers combine multiple exploits to achieve their goals.
Understanding the New A+ Security Objectives
Jan 6, 2010
Mark Edward Soper provides a useful overview of the new Security objectives in both of the A+ Certification exams.
System Protection with SMF
Dec 22, 2009
This chapter shows you how to configure four programs—NFS, IP filter, FTP, and the Apache2 Web server — as SMF services.
Software [In]security: You Really Need a Software Security Group
Dec 21, 2009
Gary McGraw explains why having a software security group is necessary for a software security initiative.
Top 4 Software Development Protection Techniques and How to Defeat Them
Dec 7, 2009
Knowing weaknesses in different protection methods can help you choose the best techniques to safeguard your intellectual property.
Exploiting phpMyadmin: How to Get root in 15 Easy Steps
Nov 20, 2009
Security expert Seth Fogie provides you with a real-world illustration of a how a simple overlooked account can lead to root access.
Software [In]security: BSIMM Europe
Nov 10, 2009
Security expert Gary McGraw and team introduce BSIMM Europe and compare some of its initial results to the original BSIMM data.
Software [In]security: Startup Lessons
Oct 22, 2009
Gary McGraw discusses the seven lessons he's learned through his startup years at Cigital.
Vanish: Email that Disappears After Sending - A Review
Oct 1, 2009
Technology expert A. Lizard offers a how-to on Vanish, software the makes your files disappear forever.
Software [In]security: BSIMM Begin
Sep 24, 2009
Gary McGraw introduces BSIMM Begin, a Web-based study focused on 40 of the 110 activities covered in the full Building Security In Maturity Model.
Locking Down a Shared or Public PC with SteadyState
Aug 28, 2009
Eric Geier helps you discover how the free Microsoft SteadyState utility can help secure and manage a multiuser PC.
Software [In]security: Attack Categories and History Prediction
Aug 25, 2009
Software security expert Gary McGraw describes how to divide attacks into four categories — and predict the attacks of tomorrow.
What Is Surreptitious Software?
Aug 11, 2009
Christian Collberg and Jasvir Nagra discuss the basic techniques used to protect secrets stored in software.
Proactive Intrusion Prevention and Response via Attack Graphs
Jul 27, 2009
This chapter describes the latest advances in an innovative proactive approach to network security called Topological Vulnerability Analysis.

<< < Prev Page 4 5 6 7 8 Next >