Welcome to TechNet Blogs Sign in | Join | Help
  I've recently written an article for November/December's TechNet Magazine which looks in detail at how to secure both your web server and transactions between it and your customer's browser(s). It's pretty technical and is approximately two Read More
<I've edited this post to add a link to the pictures together with the following image> Thank you to everyone I met at Royal Holloway from the MSc in Computer Security (distance learning) course. I can honestly say I rarely get to meet to many Read More
Just browse to a recent article on Brian Krebs' "Security Fix" column to read all about Phishers who appear to be donating to the relief effort using the credit card details of their victims! Read More
Shawn posted an interesting article along these lines which is accessible here Browse to http://www.microsoft.com/msa to download free blueprint guidance for building a wide range of data centre scenarios. MSA stands for Microsoft Systems Architecture, Read More
Matthew Fisher has written written an interesting article for the Industry Insider's blog which is hosted on TechNet. We're getting quite a few submissions from people like Matt who have best practise advise for you based on their practical experience. Read More
How do you compare and make sense of the security vulnerability announcements from different vendors? Jeff Jones's short article looks into the way Redhat, Novell Suse and Microsoft announce vulnerabilities in their software and suggests Read More
Rhys Wilkins recently made me aware of an article which advises several good practises in making sure your code isn't susceptable to SQL Injection attacks. The first prosecution (that I've heard of) was way back in 1996! The article is Read More
RIPA is an acronym for The Regulation of Investigatory Powers Act 2000 which is a piece of UK legislation governing the right of the authorities to recover information from UK organisations as required for investigations. I am not a legal expert, make Read More
Another resource I've mentioned when presenting @ TechNet events is ITShowCase - the following URL is the home of a wealth of information (including "how to" build guides) written by our internal technical administrators and architects when building and Read More
I've spoken at a number of TechNet events recently at which I've mentioned the DTI report as a useful source of UK metrics for security breaches and risks. The latest report(released in 2004) is located at the following URL. http://www.infosec.co.uk/page.cfm?HyperLink=http://www.infosec.co.uk/files/DTI_Survey_Report.pdf Read More
Bruce's recent article has started a great deal of debate. Clearly the implications for the way cryptographic signatures are relied upon more and more come into question. IMHO the sky's not about to fall down but certainly it's sensible for all software Read More
I've just read the summary to an IBM Report which discusses the perceived risk of security problems on mobile devices and even cars akin to those suffered by Personal Computer users today. This is something I've been thinking of writing about Read More
I've seen sessions @ security events which claim to "Break SSL in Internet Explorer" & recently received an email along the same lines (listed after the next couple of paragraphs starting "Subject"). The "Padlock" is part of Internet Explorer as Read More
Robert's talking to a whole bunch of folk who want to blog but are terrified! I find Blogging's a little like a first date - pretty scary ahead of time, generally lots of fun when you stop worring and get on with it - of course that's not the case with Read More
Larry Osterman's posted a really interesting article explaining how Threat Modelling helps his team improve the security of the code they develop. As Larry goes on to explain the technique's not new, nor is it rocket science and yet it's often under utilised Read More
More Posts Next page »