dcsimg

Paul Rubens - Article Archives - Page 3

5 Big Improvements in Wireshark

December 23, 2015
It's now even easier to use the open source Wireshark tool to analyze network traffic at the packet level, thanks to a recent upgrade.
READ MORE

10 Open Source Security Breach Prevention and Detection Tools

December 18, 2015
The breach prevention and detection market is dominated by names like Symantec, McAfee and Juniper, but open source tools are also popular.
READ MORE

5 Key New Features in Nmap Network Security Tool

December 15, 2015
The open source network security tool's latest version offers significant improvements.
READ MORE

Is Jailbreaking Apple Devices Always a No-No?

November 20, 2015
Apple and enterprise IT teams discourage jailbreaking Apple devices – and with good reason. But is jailbreaking always a bad thing?
READ MORE

TrueCrypt Travails Continue

October 26, 2015
Two serious bugs later, almost no one thinks it is a good idea to use TrueCrypt. But what are your options?
READ MORE

Unlocking Smartphones: PINs, Patterns or Fingerprints?

October 8, 2015
PINs, patterns and fingerprints are all options for unlocking mobile devices. But which option is most secure?
READ MORE

Do APIs Pose a Security Risk?

July 29, 2015
APIs offer a new and powerful attack vector for hackers. Fortunately, API management products can help organizations boost their API security.
READ MORE

Cyber War Is Hell

July 6, 2015
Think cyber war is bad now? It is only going to get worse – much worse -- says security expert Bruce Schneier.
READ MORE

Why Is Fighting Cybercrime So Hard?

June 22, 2015
It's tough to target the few hundred super hackers that experts believe are behind the majority of cyber attacks.
READ MORE

Static Analysis Can 'Score' Software Security

May 21, 2015
Static analysis can be even more effective in improving software security if it is used to create quality metrics.
READ MORE

Windows Server 2003: No Support, No Security?

April 30, 2015
What are your options, if any, for mitigating security risks of continuing to run Windows Server 2003 after Microsoft ends extended support in July?
READ MORE

Do Threat Exchanges Work?

April 2, 2015
Sharing intelligence on security threats is an old idea getting new cred, thanks to Facebook's new Threat Exchange. But how well do such exchanges work?
READ MORE

Hadoop Security Still Evolving

March 26, 2015
While organizations' use of Hadoop has become more sophisticated, associated security practices have not kept pace.
READ MORE

6 Tips for Developing Secure IoT Apps

February 26, 2015
Most IoT systems contain security vulnerabilities that can be exploited by hackers, a recent study found, highlighting the importance of developing secure IoT apps.
READ MORE

It's Not Easy to Determine Costs of Data Breach

January 29, 2015
Determining costs of a data breach is a complicated, but important, exercise. It may help convince executives to increase security spending.
READ MORE

10 Tips for Secure Business Travel

January 12, 2015
Business travelers are an attractive target for hackers. Here's how to protect yourself when you are on the road.
READ MORE

The Trouble with Tor

December 16, 2014
Confidence that Tor can reliably provide users with anonymity on the Internet has been shattered, thanks to recent revelations. Tor alternatives do exist, however.
READ MORE

Apple Pay: How Secure Is It?

November 13, 2014
Apple Pay and other emerging mobile payment methods like Google Wallet possess potential security vulnerabilities, yet they are more secure than credit cards.
READ MORE

Is Shellshock a Feature, not a Bug?

November 5, 2014
The Shellshock flaw highlights a major security issue. Software created before mass adoption of the Internet is highly susceptible to today's security risks.
READ MORE