Columnists (Page 10 of 48)   < Prev  5 6 7 8 9 10 11 12 13 14 15  Next >
Disclosure Survey
by Federico Biancuzzi, 2006-09-05
Federico Biancuzzi surveys statements from some of the world's largest software companies about vulnerability disclosure, interviews two security companies who pay for vulnerabilities, and then talks with three prominent, independent researchers about their thoughts on choosing a responsible disclosure process. In three parts.
http://www.securityfocus.com/columnists/415

Anonymous No More
by Mark Rasch, 2006-08-28
In the age of personal information versus aggregated information collected from search engines and other Internet services, one's privacy can no longer be assured. Mark Rasch looks at a recent Amazon patent application that shows how the laws need to be tightened because the lines of privacy are becoming blurred.
http://www.securityfocus.com/columnists/414

LinuxWorld, Virtually Speaking
by Scott Granneman, 2006-08-17
With all the free virtual machines out there running security software or acting as virtual security appliances, you'd think VMWare is on everyone's mind. Scott Granneman offers some thoughts at the close of this year's LinuxWorld.
http://www.securityfocus.com/columnists/413

E-Mail Privacy in the Workplace
by Mark Rasch, 2006-07-31
Even with a well-heeled corporate privacy policy stating that all employee communications may be monitored in the workplace, the legality of e-mail monitoring is not as clear cut as one might think.
http://www.securityfocus.com/columnists/412

A Month of Browser Bugs
by Scott Granneman, 2006-07-24
Scott Granneman looks at the virtues and pitfalls of browser fuzzing and the overwhelmingly positive impact it has on the security community.
http://www.securityfocus.com/columnists/411

Application-level Virtualization for Windows
by Federico Biancuzzi, 2006-07-12
Federico Biancuzzi interviews Eyal Dotan, who has developed application-level virtualization software that protects Windows hosts from malware. They discuss the architecture, advantages of this design, performance, and how this method could be applied to servers running Windows or be ported to other OSes.
http://www.securityfocus.com/columnists/410

Windows Genuine Disadvantage
by Mark Rasch, 2006-07-05
A recent lawsuit filed against Microsoft should have all companies reexamining their privacy policies to determine what information they are actually collecting about customers, and what they can possibly do with it.
http://www.securityfocus.com/columnists/409

MySpace, a place without MyParents
by Scott Granneman, 2006-06-30
Scott Granneman looks at the mass hysteria surrounding MySpace social security issues, examines a collection of frightening reports, and then discusses the real issue of parenting and parental supervision behind keeping our children safe.
http://www.securityfocus.com/columnists/408

Phishing with Rachna Dhamija
by Federico Biancuzzi, 2006-06-19
Federico Biancuzzi interviews Rachna Dhamija, co-author of the paper "Why Phishing Works" and creator of Dynamic Security Skins. They discuss the human factor, how easy it is to recreate a credible browser window made with images, some new anti-phishing features included in the upcoming version of some popular browsers, and the power of letting a user personalize his interface.
http://www.securityfocus.com/columnists/407

Retain or restrain access logs?
by Mark Rasch, 2006-06-12
A recent proposal by the U.S. Department of Justice that would mandate Internet Service Providers to retain certain records represents a dangerous trend of turning private companies into proxies for law enforcement or intelligence agencies against the interests of their clients or customers.
http://www.securityfocus.com/columnists/406

Columnists (Page 10 of 48)   < Prev  5 6 7 8 9 10 11 12 13 14 15  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus