IT Security

Security bloggers help keep you up to date on how to protect your network through news, updates, advice, and opinions on how you can stay ahead of hackers.

  • Selena Frye // December 2, 2008, 5:17 AM PST

    Securing voice networks

    Worried about the security concerns of a converged network? Learn the basics about VoIP threats and get some network design recommendations for locking it down.


  • Chad Perrin // October 14, 2008, 11:03 AM PST

    TSA Communication may get your bag searched

    Evan Roth's T.S.A. Communication project is described as art, and is funny at times. It may also be a problem.


  • Michael Kassner // March 29, 2009, 1:28 PM PST

    Conficker.C: April Fools or maybe not

    Conficker's creators may make the first day of April a painful day for IT types if the experts who reverse engineered the new Conficker code are right. Is there anything we can do?


  • Selena Frye // March 31, 2009, 4:53 AM PST

    Take advantage of unified communications' efficiency without the risk

    The tools we have available now for real-time communication provide efficiency and collaborative opportunities for business, but unregulated, they can also expose your company to danger. How can you protect your unified communications from misuse?


  • Selena Frye // March 17, 2009, 7:15 AM PST

    Defending against attacks targeting your users

    Increasingly sophisticated attacks aimed at users are a threat to company networks and data. Find out more about threats and solutions with this popular TechRepublic Webcast, now available on demand.


  • Chad Perrin // March 24, 2009, 7:08 AM PST

    Security 101 - Remedial Edition: Use strong passwords

    More than 100,000 hosts have been infected with a new worm called psyb0t. This worm appears to present a serious threat to home networks everywhere, if you believe the trade press reports. There may be reasons to disbelieve them in this case, though.


  • Chad Perrin // May 5, 2009, 10:48 AM PST

    5 IT security pet peeves

    Anyone who cares about a field of expertise -- really cares about it -- must have some annoyances about things that could, even should, be better, but aren't for what seem like the dumbest of reasons. I'll share five of my pet peeves in the realm of IT security.


  • Selena Frye // April 15, 2009, 11:30 PM PST

    Join us for live question-and-answer session on simplifying network security

    Get registered for a live TechRepublic Webcast on April 22 that will answer your questions about simplifying network security and getting the most out of your resources to meet the latest security threats.


  • Paul Mah // September 6, 2008, 4:59 PM PST

    Security news roundup: Webcam voyeur gets 90 days

    This week's security events include news of a vulnerability in the 64-bit edition of OpenOffice, a privilege escalation flaw in Samba, a virus infection on the International Space Station, and the arrest of yet another webcam voyeur.


  • Chad Perrin // September 4, 2008, 9:10 AM PST

    What are the security implications for Google Chrome?

    Google has announced the beta test release of its new Web browser, Chrome, and everybody's talking about it. It's time to talk about the implications this new browser may have for Web browsing security.


  • Tom Olzak // September 7, 2008, 9:00 PM PST

    The Tornado Plus encrypted USB drive: Good idea, bad design

    Not all encrypted drives are actually safe repositories for sensitive information -- even if a bunch of Internet articles point consumers and businesses in their direction. Here is just one example.


  • Chad Perrin // September 9, 2008, 6:46 AM PST

    The trouble with test versions

    Alpha and beta test releases of applications provide an easy way to get early, free access to new software. Google Chrome serves as an excellent example of how important it is to be very careful with testing versions of applications.


  • Chad Perrin // May 28, 2008, 3:50 AM PST

    Is PhoneFactor really better security?

    Chad Perrin explores the security solution, PhoneFactor, which favors a two-factor authentication process for accessing your online banking account. Is the extra inconvenience worth it for the security offered? How secure is a third-party solution from your bank?


  • Chad Perrin // May 29, 2008, 10:37 PM PST

    Security alarmism helps the bad guys win

    Chad Perrin examines what passes for security in the "post-9/11 world" and finds it lacking, particularly as it affects users and cybercrime. Instead of security awareness, he sees security alarmism on the rise, and along with it, the threat of innocent people being persecuted and actual criminals slipping through the cracks.


  • Chad Perrin // May 20, 2008, 4:49 AM PST

    Detect and replace vulnerable SSH keys on Debian

    As many of my readers no doubt already know, Debian GNU/Linux recently had some cryptographic vulnerability problems. By far, the most common effect of this on users of Debian will be the existence of weak cryptographic keys for OpenSSH. If you have SSH keys generated by OpenSSH on Debian or a Debian-derived system such as Ubuntu since the introduction of the Etch release, you are at risk, and should probably generate new SSH keys.