Columnists (Page 23 of 48)   < Prev  18 19 20 21 22 23 24 25 26 27 28  Next >
Lycos Goes Straight
by Mark Rasch, 2004-12-06
After a week of well-deserved criticism, Lycos is abandoning its scheme to launch denial-of-service attacks against spammy websites. Did the company reform in time to avoid criminal prosecution?
http://www.securityfocus.com/columnists/282

Closed Source Hardware
by Jason Miller, 2004-12-01
Trust with hardware vendors for open source systems is becoming a one-way street, where in exchange for support they offer a closed source binary solution with no provision to audit security.
http://www.securityfocus.com/columnists/281

Seeds of Disaster
by Mark Burnett, 2004-11-29
Internet Explorer's problems can be traced to Microsoft's shortsightedness during the browser wars of the 1990s. Is the company sowing tomorrow's security woes today?
http://www.securityfocus.com/columnists/279

Profitware
by Kelly Martin, 2004-11-26
Some of the largest anti-virus companies have virtually ignored the spyware problem because there is no profit incentive for them to do otherwise. Meanwhile, spyware companies make millions.
http://www.securityfocus.com/columnists/278

Bill Gates Is Right?
by Scott Granneman, 2004-11-19
Bill Gates is right about one thing: asking people to use a two-factor form of authentication would go a long way toward alleviating a lot of the password problems that plague computer security today.
http://www.securityfocus.com/columnists/277

The Worst Case Scenario
by Mark Rasch, 2004-11-15
The fine print in an insurance policy becomes an issue when a bizarre chain of IT disasters leaves a company without a single copy of the source code to its flagship product.
http://www.securityfocus.com/columnists/276

The Cost of Security Training
by Don Parker, 2004-11-04
The cost of providing security training to your staff may be high, but what is the cost of not providing any training at all?
http://www.securityfocus.com/columnists/275

Phishing For Savvy Users
by Scott Granneman, 2004-11-01
Recent "phishing" episodes are still often overlooked by tech-savvy users, but a lesson in history shows how entire nations have been fooled.
http://www.securityfocus.com/columnists/274

The Latest Tool in Competition: Hacking
by Mark Rasch, 2004-10-25
A new federal case illustrates the role computer intrusion is taking in the high-stakes world of niche Internet commerce.
http://www.securityfocus.com/columnists/273

Security, 1994-2004: Then And Now
by Daniel Hanson, 2004-10-20
Comparing the state of security in 1994 versus 2004, has anything really changed over the course of ten years?
http://www.securityfocus.com/columnists/272

Columnists (Page 23 of 48)   < Prev  18 19 20 21 22 23 24 25 26 27 28  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus