The Wayback Machine - https://web.archive.org/web/20130822084804/http://www.devx.com:80/security/
advertisement
Login | Register   
Twitter
RSS Feed
Download our iPhone app
TODAY'S HEADLINES  |   ARTICLE ARCHIVE  |   FORUMS  |   TIP BANK
Browse DevX

advertisement
advertisement

Security Zone

FEATURED ARTICLE
August 15, 2013
It’s not a technology problem. It’s a governance and public policy problem.

NEWEST ARTICLES

August 13, 2013
If you believe that Bitcoin is good for anything other than paying hackers to find weaknesses, then you’re in for a rude awakening.
August 8, 2013
Don’t count on this simple technique to mitigate the insider risk
July 23, 2013
Nobody is 100% trustworthy.
July 9, 2013
For perfect cybersecurity, disconnect your systems, put them in a locked room, and throw away the key.
June 7, 2013
Headline: National Security Agency Caught Unawares by Cyberattack
May 15, 2013
Want Cybersecurity? Get Cloud. That’s the perspective of General Keith Alexander, director of the National Security Agency and commander of the U.S. Cyber Command.
May 12, 2013
Would anybody in your organization click a benign link to a news article, and then provide login credentials?
April 26, 2013
The increasingly trusted Twitter service is one more front in the global Cyberwar we're woefully unprepared to defend.
April 11, 2013
All signs point to the bad guys winning whatever Cyberwar you care to identify. At this rate, it won't be long until feuding groups of teenage Script Kiddies run the world.
March 24, 2013
Cyberwarfare is redefining warfare, just as nuclear weapons did in the last century.
March 17, 2013
Go after the hackers before they attack. Taking this Agile Architecture approach to Cybersecurity gives you a leg up.
March 14, 2013
Do you really think your SSN and credit report are confidential? In your dreams.
March 12, 2013
What are the greatest vulnerabilities on your network? Your website? User passwords? DNS? Phishing attacks? Perhaps. But what about SMB (Server Message Block)?
February 27, 2013
With the threat of a Cyber 9/11 brewing, extraordinary steps -- even some kind of Cyber-Martial Law -- should be a real option.
February 16, 2013
In the world of Cybersecurity, never take anything at face value.
February 3, 2013
Leaving Java running allows hackers to take over my computer. Keeping it turned off has no apparent downside. Why ever turn Java back on?
December 16, 2012
A backup is only as good as your ability to restore your data from the backup.
December 14, 2012
Combining  SSL and encrypted volumes can secure your Cloud data in motion and at rest, but it plug all the holes.
November 20, 2012
We haven't yet seen any type of cyber attack that changes the game. Some kind of coordinated effort that causes unexpected, appalling damage. In other words, we haven't had our Cyber-9/11 yet.
advertisement
advertisement
advertisement
Sitemap