IT Security

Security bloggers help keep you up to date on how to protect your network through news, updates, advice, and opinions on how you can stay ahead of hackers.

  • Chad Perrin // February 12, 2009, 2:25 AM PST

    10 tips for personal security when you leave an employer

    Employers aren't the only people who have to look after security in an employment transition period. You should pay attention to threats to your personal privacy and security when you leave a job, too.


  • Tom Olzak // February 11, 2009, 2:26 AM PST

    Enabling drive-level encryption is only the beginning

    The TCG released a new standard for encryption at drive-level. Sounds good, but how does this actually impact enterprise data encryption efforts, particularly pre-boot authentication?


  • Tom Olzak // February 15, 2009, 8:00 PM PST

    Free Browser Security Handbook

    Google's Browser Security Handbook is packed full of useful information if you need a low-level look at how a browser might behave within specific use contexts.


  • Tom Olzak // February 8, 2009, 8:00 PM PST

    Don't expect too much from your browser

    The browser is typically blamed for most if not all Web-related security problems faced by business and home users. But the browser isn't the problem. The real problems still sit under the browser and about 19 inches from the monitor.


  • Chad Perrin // February 5, 2009, 5:38 AM PST

    10 important categories of employment transition security

    Employment transition is an often overlooked danger to company security. Make sure you pay proper attention to protecting your business from security compromises when someone leaves your company.


  • Tom Olzak // February 3, 2009, 8:00 PM PST

    Balancing employee computing flexibility against privacy concerns

    The number of organizations providing tablet or laptop PCs to nurses and other health care professionals who provide at-home care is growing. And so are risks to patient privacy. How much flexibility can you safely give mobile health care workers?


  • Chad Perrin // February 3, 2009, 8:23 AM PST

    Is this what they call a feature?

    We've probably all heard the old joke that at Microsoft, "It's not a bug, it's a feature." Microsoft is at it again.


  • Chad Perrin // November 18, 2008, 5:29 AM PST

    No such thing as effective license enforcement

    License security is not the same as software security. In fact, sometimes they are at odds with one another.


  • Chad Perrin // November 13, 2008, 2:33 AM PST

    Microsoft finally catches the eight year bug

    Microsoft released a patch this week for a critical vulnerability. The catch: this vulnerability has been known since 2000, and it's a bug in a service active on almost every MS Windows system in the world. How safe do you feel?


  • Tom Olzak // November 11, 2008, 8:00 PM PST

    How do new private browsing capabilities affect forensics?

    Chrome has it. IE8 and Firefox 3.1 have it. So what does it mean to forensics investigators? I'm talking about private browsing--the ability to visit sites, conduct research, or participate in illegal/unethical activities without leaving tell-tale signs behind.


  • Paul Mah // November 17, 2008, 1:55 AM PST

    Simple hardware approaches to secure laptops

    Users are increasingly buying laptops and netbooks, attracted by their portability and low prices. The inevitable result is more employees bringing personal laptops into the office, where they are used to access and store corporate data. Here are some ways to mitigate the risks of data breaches.


  • Tom Olzak // November 16, 2008, 8:00 PM PST

    DNS resource record integrity is still a big, big problem

    The need to secure DNS has never been greater. Attacks against DNS cache integrity, including entire zone references, are an easy way for criminals to redirect your unsuspecting users to malicious sites. Current controls are still lacking.


  • Chad Perrin // November 11, 2008, 2:45 AM PST

    More email security tips

    Email security is about a lot more than just using a good password on your POP or IMAP server. Perhaps the most important part of email security is ensuring you don't shoot yourself in the foot.


  • Tom Olzak // November 9, 2008, 8:00 PM PST

    Prevent your employees from "going rogue"

    There is often a personal crisis trigger that causes an already borderline employee to cross the border. Would intervention prevent information compromise or system loss? Can an employee be helped in a way which prevents an incident?


  • Paul Mah // November 9, 2008, 3:59 PM PST

    Security News Roundup: Security researchers to demonstrate WPA packet injection

    This week's security events include news that there will be just two updates for Microsoft's Patch Tuesday this month, the appearance of an exploit for Adobe Reader spotted in- the-wild, Adobe releasing an update to resolve a ColdFusion vulnerability, and news that security researchers will demonstrate WPA packet injection for the first time.