Intrusion Prevention Systems
Network Access Control
Endpoint Detection and Response
Data Loss Prevention
Enterprise Mobility Management
Mobile Device Management
Threat Intelligence and Analytics
Identity and Access Management
Cloud Security Best Practices
Kenneth van Wyk - ALL ARTICLES - PAGE 1
IE9 vs Firefox 4: Which is Safer?
December 1, 2010
With Internet Explorer 9 and Firefox 4 in stable betas, which is better at protecting your data, your privacy, and your desktop?
Security Showdown: Mac vs PC
February 23, 2010
Columnist Kenneth van Wyck takes Windows 7 and Snow Leopard out for a spin to see which operating system offers the best security.
Firefox 3.5 vs. Internet Explorer 8: Which is Safer?
July 13, 2009
A security expert provides a point-by-point comparison of today's two leading browsers.
Protect Yourself on Facebook
April 20, 2009
Tips on protecting yourself and your PC as you use Facebook, Twitter and other social networking sites.
Cell Phone Security Updates: Voluntary or Involuntary?
March 10, 2009
Should mobile carriers push out updated software to customers regardless of choice, or is it safer to have the users request the updates?
OWASP: Helping Web Developers Develop Securely
February 3, 2009
The Open Web Application Security Project (OWASP) is a non-profit thats aiding Web developers to avoid major security problems in coding. Plus: a Top 10 list of the most common Web security problems.
Van Wyk on the 'Top 25 Programming Errors'
January 19, 2009
A noted security expert talks about the larger meaning of the recently released list of top programming errors.
Security Nightmare in the iPhone App Gold Rush
January 7, 2009
Just how safe is it to download and use, say, an application that can access an Amazon account and make purchases with one click? (Gulp!)
Safe Online Shopping: a Tech Expert's Tips
December 3, 2008
An insiders guide to browser and password safety as you travel the Internet searching for bargains.
Security Watch: Problems with Penetration Testing
November 20, 2008
Security experts conduct countless pen tests to secure application systems, yet several problems limit their effectiveness.
Cybersecurity Best Practice: Guilty Until Proven Innocent
September 17, 2008
When it comes to our computers, the classic principle of innocent until proven guilty is simply too dangerous.
How to Prevent a Coffee Shop Wi-Fi Attack
September 16, 2008
Logging on using your mobile device allows hackers to steal your password unless you take basic precautions.
Why Are IT Security Pros so Bad?
September 15, 2008
Have you heard about the security conference where the organizers inadvertently distributed a virus-infected USB stick to the attendees?
Browser Security: IE vs. Safari vs. Firefox
September 15, 2008
Each of the three browsers has strengths in malware protection, but its their weaknesses that are the most worrisome.
Security: Leopard vs. Vista
May 6, 2008
A security expert revisits an earlier examination he made of the relative security of Mac Tiger and Windows XP.
Security Watch: Living with PCI DSS
March 18, 2008
A security experts hope the industry can keep that momentum going and start really paying attention to the security of our software, and not just try to retro-engineer security through largely superficial bolt-on products.
The Boeing Dreamliner "Security"
February 8, 2008
In some situations -- like 30,000 feet in the air -- an ironclad firewall is incredibly important.
The Security Concerns of 2008: Get Ready Now
January 16, 2008
As the new year dawns, some pressing security threats deserve more attention. For example, Cross Site Request Forgery (CSRF) is remarkably wide spread.
Google's Android vs. Apple's iPhone: Which is More Secure?
December 7, 2007
Examining the two platforms on a feature by feature basis, the Android appears far more promising in guarding against hackers.
SECURITY DAILY NEWSLETTER
GET SECURITY NEWS IN YOUR INBOX EVERY DAY
TERMS OF SERVICE
LICENSING AND REPRINTS
Copyright 2017 Quinstreet Inc. All Rights Reserved.