Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of rockyheckman

rockyheckman

Send rockyheckman an email

Latest from rockyheckman

  • BitLocker experiences
    Security

    BitLocker experiences

    With Windows Vista on the eventual Horizon, I've been working with the Betas and having a look at the security features. One of the ones I'm anticipating with great enthusiasm is Bitlocker. Bitlocker is a drive encryption system that actually encrypts the entire contents of a drive. Being the paranoid sort I am, I figured it would be a great thing to set up and use.

    rockyheckman
    Published:  May 30, 2006, 4:17 AM PDT Modified:  October 6, 2011, 1:36 AM PDT Read More See more Security
  • Secure By Default or Usable?
    Microsoft

    Secure By Default or Usable?

    We are stuck in a position where OS vendors have to make a choice between secure by default for enterprise customers, and usable for the home market. Which way do we go?

    rockyheckman
    Published:  April 7, 2006, 4:50 AM PDT Modified:  October 6, 2011, 1:34 AM PDT Read More See more Microsoft
  • Attack Modeling vs Threat Modeling
    Security

    Attack Modeling vs Threat Modeling

    Traditional Threat Modeling from an adversarial approach is actually Attack Modeling. So what is Threat Modeling then and how does it differ from Attack Modeling?

    rockyheckman
    Published:  March 30, 2006, 1:20 AM PST Modified:  October 6, 2011, 1:34 AM PDT Read More See more Security
  • Introduction to Infocard
    Security

    Introduction to Infocard

    Identity provisioning is a hot topic in the Internet right now. Microsoft is behind a new version called Infocard. Here is a brief introduction to what Infocard is.

    rockyheckman
    Published:  March 15, 2006, 3:30 AM PST Modified:  October 6, 2011, 1:33 AM PDT Read More See more Security
  • Application Threat Modeling v2
    Developer

    Application Threat Modeling v2

    Threat Modeling has become one of the most important ways to increase the security of your application development projects. It allows you to understand the threats you will face, and implement countermeasure in a consistent, reliable way. If you only do one thing to improve yoru development processes, Threat Modeling should be it. Now with the new ACE Threat Modeling methodology and tools, it's easy to do as well!

    rockyheckman
    Published:  March 7, 2006, 8:12 AM PST Modified:  October 6, 2011, 1:32 AM PDT Read More See more Developer
  • New Dev Security Training Modules
    Data Management

    New Dev Security Training Modules

    The Patterns and Practices team at Microsoft has posted some secure development training modules from Keith Brown.

    rockyheckman
    Published:  February 24, 2006, 7:57 AM PST Modified:  October 6, 2011, 1:32 AM PDT Read More See more Data Management
  • Buffer Overflows still an issue
    Security

    Buffer Overflows still an issue

    Developers are saying they've heard enough about buffer overflows and they knwo how to prevent them. Ok, then why are we still seeing them? There is still unmanaged code out there, and we still need to pay attention to how we write it.

    rockyheckman
    Published:  February 10, 2006, 3:48 AM PST Modified:  October 6, 2011, 1:31 AM PDT Read More See more Security
  • Is Agile development secure?
    Developer

    Is Agile development secure?

    Agile development methodologies might be the new fad in software design but how much emphasis is there on secure code?

    rockyheckman
    Published:  August 8, 2005, 9:19 AM PDT Modified:  October 6, 2011, 1:29 AM PDT Read More See more Developer

TechRepublic Premium

  • TechRepublic Premium

    Media disposal policy

    PURPOSE This Media disposal policy from TechRepublic Premium provides specific instructions for ensuring organization data is properly protected when disposing of old storage media. From the policy: POLICY DETAILS When disposing of damaged, unusable, obsolete, off-lease, decommissioned, old, or end-of-service-life equipment and media, the organization requires that the guidelines outlined herein be followed: Hard drives, ...

    Published:  March 30, 2023, 12:00 PM EDT Modified:  March 31, 2023, 11:06 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    IT email templates: Upcoming software release

    PURPOSE To take some of the effort out of writing (and rewriting) emails to share with company staff and executives, TechRepublic Premium has assembled basic templates to handle the most common types of communications. Simply copy the text into your favorite word processor and customize it to fit your needs. Then, paste it into an ...

    Published:  March 30, 2023, 12:00 PM EDT Modified:  March 31, 2023, 11:29 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Mobile app development policy

    PURPOSE The purpose of this policy from TechRepublic Premium is to provide guidelines for developing mobile applications from a security, procedural and best practices standpoint. While it contains technical guidelines, it is not intended to serve as a programming guide but as a framework for operations. This policy can be customized as needed to fit ...

    Published:  March 29, 2023, 12:00 PM EDT Modified:  March 30, 2023, 4:43 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    New client audit checklist

    PURPOSE This checklist from TechRepublic Premium provides a method for auditing and documenting a client site and assembling an inventory of systems and software, as well as giving you a framework for developing recommendations, applying costs to them, and storing all that information in one file. Tracking client contact details, circuit information, network equipment, cloud ...

    Published:  March 29, 2023, 12:00 PM EDT Modified:  March 30, 2023, 4:54 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice