Search: Home Bugtraq Vulnerabilities Mailing Lists Security Jobs Tools
Columnists (Page 1 of 37)   1 2 3 4 5 6 7 8 9 10 11  Next >
This Means Warcraft!
by Mark Rasch, 2006-04-03
A recent World of Warcraft case involved a WoW book by Brian Knopp that was being sold on eBay. It resulted in automated takedown notices by "lawyerbots" and shows how the legal process today can end up silencing legitimate uses of trademarks and copyrights.
http://www.securityfocus.com/columnists/396

Open source security testing methodology
by Federico Biancuzzi, 2006-03-29
Truth is made of numbers. Following this golden rule, Federico Biancuzzi interviewed Pete Herzog, founder of ISECOM and creator of the OSSTMM, to talk about the upcoming revision 3.0 of the Open Source Security Testing Methodology Manual. He discusses why we need a testing methodology, why use open source, the value of certifications, and plans for a new vulnerability scanner developed with a different approach than Nessus.
http://www.securityfocus.com/columnists/395

Security Czar
by Scott Granneman, 2006-03-23
In this column Scott Granneman takes the role of dictator of the security world and presents his ideas about mandatory reforms that would improve security for millions of people.
http://www.securityfocus.com/columnists/394

Encryption for the masses
by Kelly Martin, 2006-03-21
File and disk encryption needs to be simple and easy if it's going to be used. This article looks at Apple's FileVault and takes a sneak peak at what's coming in Windows Vista.
http://www.securityfocus.com/columnists/393

Human rights and wrongs online
by Mark Rasch, 2006-03-13
A government's position on censorship used to protect its citizenry is dictated by who they are. The well-popularized censorship of Internet content in China by Google and other big players, and criticism of this by the U.S. government, is really just the tip of the iceburg.
http://www.securityfocus.com/columnists/392

The value of vulnerabilities
by Jason Miller, 2006-03-07
There is value in finding vulnerabilities. Yet many people believe that a vulnerability doesn't exist until it is disclosed to the public. We know that vulnerabilities need to be disclosed, but what role do vendors have to make these issues public?
http://www.securityfocus.com/columnists/391

The big DRM mistake
by Scott Granneman, 2006-03-01
Digital Rights Managements hurts paying customers, destroys Fair Use rights, renders customers' investments worthless, and can always be defeated. Why are consumers and publishers being forced to use DRM?
http://www.securityfocus.com/columnists/390

Spreading security awareness for OS X
by Robert Lemos, 2006-02-27
Robert Lemos interviews Kevin Finisterre, founder of security startup Digital Munition, who created the three recent versions of the InqTana worm to raise awareness of security in Apple's OS X. Finisterre discusses his reasons for creating the worms, the problems with Mac OS X security, and why he does not fear prosecution.
http://www.securityfocus.com/columnists/389

John the Ripper 1.7, by Solar Designer
by Federico Biancuzzi, 2006-02-22
Federico Biancuzzi interviews Solar Designer, creator of the popular John the Ripper password cracker. Solar Designer discusses what's new in version 1.7, the advantages of popular cryptographic hashes, the relative speed at which many passwords can now be cracked, and how one can choose strong passphrases (forget passwords) that are harder to break.
http://www.securityfocus.com/columnists/388

Strict liability for data breaches?
by Mark Rasch, 2006-02-20
A recent case involving a stolen laptop containing 550,000 people's full credit information sheds new night on what "reasonable" protections a company must make to secure its customer data - and what customers need to prove in order to sue for damages.
http://www.securityfocus.com/columnists/387

Columnists (Page 1 of 37)   1 2 3 4 5 6 7 8 9 10 11  Next >







 

Privacy Statement
Copyright 2005, SecurityFocus