We use cookies and other similar technologies (Cookies) to enhance your experience and to provide you with relevant content and ads. By using our website, you are agreeing to the use of Cookies. You can change your settings at any time. Cookie Policy.

Recently in Better Protection Category

Wasn't it deep in the bowels of a Washington DC parking garage that Deep Throat stepped out and told Woodward and Bernstein that if they wanted to break Watergate wide open, they had to follow the money. I think the... Read More..
Categories:

First thing, I do want to mention that, if I do say so myself, the ebizQ weekly Security Newsletter is really shaping up into a must-read document. The newsletter goes out every Monday, and has all the features, blogs, and... Read More..
Categories:

Who Can't You Trust?

user-pic
Vote 0 Votes
As Mike Rothman over at Security Incite says, the only truly safe computer is one that is shut down and disconnected from the network. And I guess you could follow that with, the only truly trustworthy co-worker is a dead... Read More..
Categories:

What Worries CSOs Most

user-pic
Vote 0 Votes
While the news and bloggers seems to continually focus on the newest threat (you could almost say in terms of security, if the corporate brand bleeds, it leads), according to Dark Reading, what worries CSO's most is creating and enforcing... Read More..
Categories:

According to Errata Security, the United Nations website was recently hacked using a simple SQL injection bug. And while this vulnerability might seem surprising for a site as well known as the UN, numerous sites all over the internet have... Read More..
Categories:

Ajax -- or Asynchronous Javascript and XML-- has come to dominate Web 2.0, but it is coming at a price: security. According to Information Week, SPI Dynamics demonstrated at Black Hat last Wednesday several ways to break a web site... Read More..
Categories:

While keeping up with all the big and important threats like the Storm worm, the recent wave of PDF attacks, and continually resisting those special greeting cards from your ‘best friends’ who refuse to tell you their name, the fact... Read More..
Categories:

Where much of the news about data protection following the TJX debacle has focused on hardening the storage of consumer information from direct attack, according to eWeek, an entirely other avenue of data vulnerability continues to operate right out in... Read More..
Categories:

Listen to or download the entire 10:03 podcast below: Download file What follows is a summary of my discussion with Mike Rothman, top analyst and founder of the website Security Incite, where we discuss the recent escalation of security attacks,... Read More..
Categories:

Keeping up with your email is now absolutely essential no matter where you are, which means sometimes jumping on free WiFi connections in airports or coffee shops or at conventions. But how big of a risk is it? If you... Read More..
Categories:

Peter Schooff's blog is a daily look at what's going on in the world of computer security with an emphasis on how it affects businesses.

Peter Schooff

Peter Schooff is Contributing Editor at ebizQ, and manager of the ebizQ Forum. Contact him at pschooff@techtarget.com

Recently Commented On

Monthly Archives

Blogs

ADVERTISEMENT