IT Security

Security bloggers help keep you up to date on how to protect your network through news, updates, advice, and opinions on how you can stay ahead of hackers.

  • Chad Perrin // June 30, 2009, 9:48 AM PST

    Stay out of Bozeman

    Bozeman, Montana has some disturbing city employment application requirements. The effects of those requirements might be more important than you think.

    0

  • Michael Kassner // July 6, 2009, 7:49 AM PST

    Insider risk or threat: Which are you?

    Some security articles refer to insiders as potential risks in one paragraph, but further on classify insiders as serious threats. Michael Kassner asks, are you a risk, a threat, or both? What's the difference?

    0

  • Selena Frye // July 8, 2009, 6:31 AM PST

    Security tips and checklists for re-evaluating your infrastructure

    Use the sultry summer days to catch up on the latest security tips from Global Knowledge experts. You might find a few new ideas to shore up your network.

    0

  • Chad Perrin // July 9, 2009, 2:25 AM PST

    Protect Webserver directories from unwanted browsing

    The <strong>reddit</strong> social news aggregation site now has a category just for Webserver directories that are not protected from unauthorized browsing.

    0

  • Michael Kassner // July 13, 2009, 6:27 AM PST

    Cybersecurity: It's our problem

    Two law professors want a paradigm shift in how we approach cybersecurity. Michael Kassner discusses this new theory and wants to know what you think about it.

    0

  • Paul Mah // June 22, 2008, 7:39 PM PST

    Security news roundup: New vulnerability affects Firefox 3

    This week's security roundup includes a new vulnerability discovered in Firefox, Microsoft admitting to a mistake with a recent Bluetooth patch, the lack of any progress at cracking the Gpcode.ak ransomware, and the loss of NHS laptops that could expose the personal particulars of up to 30,000 patients.

    0

  • Tom Olzak // June 24, 2008, 3:48 AM PST

    Managing risk with After Action Reviews

    Responding to security incidents, whether they are malicious or accidental, requires a final step that many organizations neglect. An After Action Plan (AAR) helps to reduce the probability of a recurrence and improve response activities. Tom Olzak shows you how to execute a standard AAR.

    0

  • Chad Perrin // June 24, 2008, 4:51 AM PST

    How FreeBSD makes vulnerability auditing easy: portaudit

    Find out how FreeBSD's portaudit tool goes a long way toward helping you maintain a secure system, simply and easily.

    0

  • Tom Olzak // June 25, 2008, 5:28 AM PST

    Free security tools: Secunia Personal Software Inspector

    Making sure applications in new or existing endpoint system images are free from unpatched vulnerabilities is not an easy task. Secunia provides a free utility to help identify and quickly remediate out-of-date or EOL programs.

    0

  • Chad Perrin // June 27, 2008, 5:55 AM PST

    Knowing the superficial side of security is important, too

    Maybe you're a sole proprietor or a home computer user, answerable to nobody but yourself for security policy. If you have to answer to others, though, you need to know more than good security practice; you also need to know the good, bad, and ugly of industry best practices.

    0

  • Paul Mah // June 28, 2008, 3:53 PM PST

    Security news roundup: Hackers crack London Tube's Oyster Cards

    This week's security events include a vulnerability in the multicast filter of an unpatched Solaris 10 system, Trojans targeting the ARDAgent flaw in Mac OS X, hacks of the London Tube's Oyster Card, and an IT manager who got 63 months for causing massive data loss at his former employer.

    0

  • Tom Olzak // June 29, 2008, 11:00 PM PST

    Ethics vs. Whitewash

    Security doesn't happen by wishful thinking. It takes hard work, commitment, and management support. Doing the right thing isn't always easy, but we should expect it from those to whom we entrust our information.

    0

  • Tom Olzak // July 1, 2008, 9:30 PM PST

    Security Management Tip: Inspect what you expect

    Never assume your security team is focused on the same things you are. Take every opportunity to ensure they are following the path you laid out. If not, course correct, course correct, course correct...

    0

  • Tom Olzak // July 6, 2008, 9:00 PM PST

    Forensics: Text messaging privacy

    A recent U.S. Federal court ruling seems to prohibit employer access to employee text message content. But that's not entirely true.

    0

  • Chad Perrin // July 3, 2008, 3:57 AM PST

    Google opens up RatProxy

    RatProxy, Google's own proxy-based Web vulnerability testing tool, is now available to the public under an open source license.

    0