IT Security

Security bloggers help keep you up to date on how to protect your network through news, updates, advice, and opinions on how you can stay ahead of hackers.

  • Tom Olzak // February 24, 2009, 7:58 PM PST

    Yubikey: Potential and possibilities

    Yubico's Yubikey provides the opportunity for an inexpensive and easy to use OTP solution. It also allows entry of long static passwords without typing them character by character.

    0

  • Chad Perrin // February 24, 2009, 5:06 AM PST

    5 tips for choosing a registrar for sites you care about

    Many people and businesses make their domain registrar selections based on the businesslike appearance of a Website or the popularity of the registrar's name. It is, in fact, often the most well-known names in domain registration that will pose the biggest problems for your domain name security.

    0

  • Michael Kassner // February 23, 2009, 8:57 PM PST

    SSL: Broken even more

    Lately, security conferences have been bad news for SSL. The recently held Black Hat DC 09 was no different, with independent security guru Moxie Marlinspike explaining quite convincingly how he was able to completely bypass SSL security.

    0

  • Tom Olzak // February 22, 2009, 6:46 PM PST

    Restless data: Diffusion via virtualization

    Left on its own, data will find its way to the farthest recesses of your data center. But when helped along by implementation teams, there's no limit to data diffusion.

    0

  • Chad Perrin // February 19, 2009, 7:11 AM PST

    E-mail needs safe rendering

    At the moment, the only really safe way to view e-mail is plain text. What if someone actually went to the trouble of creating a safe rich content rendering mode for an e-mail client?

    0

  • Tom Olzak // February 17, 2009, 8:00 PM PST

    Repeat after me, anything can be hacked

    President Obama probably has the most famous Blackberry on the planet. His insistence on keeping a Blackberry as his personal communication device caused a stir among Whitehouse and national security staff. But Obama's Blackberry is now secure, or is it?

    0

  • Chad Perrin // February 17, 2009, 9:44 AM PST

    Lenovo provides an excellent example of how not to handle user data

    Improper user data management policy can create threats to the privacy of your users. A leading laptop manufacturer and vendor has inadvertently provided an example of how not to manage your users' data.

    0

  • Tom Olzak // February 15, 2009, 8:00 PM PST

    Free Browser Security Handbook

    Google's Browser Security Handbook is packed full of useful information if you need a low-level look at how a browser might behave within specific use contexts.

    0

  • Chad Perrin // February 14, 2009, 5:28 AM PST

    A practical example of why HTML e-mail is a bad idea

    Viewing emails without rendering HTML formatted content can be a simple, easy, and effective security technique.

    0

  • Chad Perrin // February 12, 2009, 2:25 AM PST

    10 tips for personal security when you leave an employer

    Employers aren't the only people who have to look after security in an employment transition period. You should pay attention to threats to your personal privacy and security when you leave a job, too.

    0

  • Tom Olzak // February 11, 2009, 2:26 AM PST

    Enabling drive-level encryption is only the beginning

    The TCG released a new standard for encryption at drive-level. Sounds good, but how does this actually impact enterprise data encryption efforts, particularly pre-boot authentication?

    0

  • Tom Olzak // February 8, 2009, 8:00 PM PST

    Don't expect too much from your browser

    The browser is typically blamed for most if not all Web-related security problems faced by business and home users. But the browser isn't the problem. The real problems still sit under the browser and about 19 inches from the monitor.

    0

  • Chad Perrin // February 5, 2009, 5:38 AM PST

    10 important categories of employment transition security

    Employment transition is an often overlooked danger to company security. Make sure you pay proper attention to protecting your business from security compromises when someone leaves your company.

    0

  • Tom Olzak // February 3, 2009, 8:00 PM PST

    Balancing employee computing flexibility against privacy concerns

    The number of organizations providing tablet or laptop PCs to nurses and other health care professionals who provide at-home care is growing. And so are risks to patient privacy. How much flexibility can you safely give mobile health care workers?

    0

  • Chad Perrin // February 3, 2009, 8:23 AM PST

    Is this what they call a feature?

    We've probably all heard the old joke that at Microsoft, "It's not a bug, it's a feature." Microsoft is at it again.

    0