Paul Rubens - Article Archives - Page 3

Is Jailbreaking Apple Devices Always a No-No?

November 20, 2015
Apple and enterprise IT teams discourage jailbreaking Apple devices – and with good reason. But is jailbreaking always a bad thing?
READ MORE

TrueCrypt Travails Continue

October 26, 2015
Two serious bugs later, almost no one thinks it is a good idea to use TrueCrypt. But what are your options?
READ MORE

Unlocking Smartphones: PINs, Patterns or Fingerprints?

October 8, 2015
PINs, patterns and fingerprints are all options for unlocking mobile devices. But which option is most secure?
READ MORE

Do APIs Pose a Security Risk?

July 29, 2015
APIs offer a new and powerful attack vector for hackers. Fortunately, API management products can help organizations boost their API security.
READ MORE

Cyber War Is Hell

July 6, 2015
Think cyber war is bad now? It is only going to get worse – much worse -- says security expert Bruce Schneier.
READ MORE

Why Is Fighting Cybercrime So Hard?

June 22, 2015
It's tough to target the few hundred super hackers that experts believe are behind the majority of cyber attacks.
READ MORE

Static Analysis Can 'Score' Software Security

May 21, 2015
Static analysis can be even more effective in improving software security if it is used to create quality metrics.
READ MORE

Windows Server 2003: No Support, No Security?

April 30, 2015
What are your options, if any, for mitigating security risks of continuing to run Windows Server 2003 after Microsoft ends extended support in July?
READ MORE

Do Threat Exchanges Work?

April 2, 2015
Sharing intelligence on security threats is an old idea getting new cred, thanks to Facebook's new Threat Exchange. But how well do such exchanges work?
READ MORE

Hadoop Security Still Evolving

March 26, 2015
While organizations' use of Hadoop has become more sophisticated, associated security practices have not kept pace.
READ MORE

6 Tips for Developing Secure IoT Apps

February 26, 2015
Most IoT systems contain security vulnerabilities that can be exploited by hackers, a recent study found, highlighting the importance of developing secure IoT apps.
READ MORE

It's Not Easy to Determine Costs of Data Breach

January 29, 2015
Determining costs of a data breach is a complicated, but important, exercise. It may help convince executives to increase security spending.
READ MORE

10 Tips for Secure Business Travel

January 12, 2015
Business travelers are an attractive target for hackers. Here's how to protect yourself when you are on the road.
READ MORE

The Trouble with Tor

December 16, 2014
Confidence that Tor can reliably provide users with anonymity on the Internet has been shattered, thanks to recent revelations. Tor alternatives do exist, however.
READ MORE

Apple Pay: How Secure Is It?

November 13, 2014
Apple Pay and other emerging mobile payment methods like Google Wallet possess potential security vulnerabilities, yet they are more secure than credit cards.
READ MORE

Is Shellshock a Feature, not a Bug?

November 5, 2014
The Shellshock flaw highlights a major security issue. Software created before mass adoption of the Internet is highly susceptible to today's security risks.
READ MORE

Passwords Not Going Away Any Time Soon

October 20, 2014
While biometric authentication and other password alternatives abound, traditional passwords remain the go-to method of authentication due to low cost.
READ MORE

Mobile Device Management Not Just for Big Companies

October 17, 2014
While mobile device management is often found at companies with big workforces, it can also help small companies with their mobile initiatives.
READ MORE

VeraCrypt a Worthy TrueCrypt Alternative

October 13, 2014
VeraCrypt, a popular open source encryption alternative to TrueCrypt, is at a crossroads as its primary contributor lacks the time to maintain it on his own.
READ MORE