dcsimg

Kenneth Van Wyk - Article Archives - Page 2

Mozilla Thunderbird vs. Microsoft Outlook

October 2, 2007
A security expert examines the relative security of the two programs on a point-by-point basis.
READ MORE

Mozilla Firefox vs. Internet Explorer: Which is Safer?

September 5, 2007
Based on a point-by-point security comparison, a security expert lays out his opinion.
READ MORE

The iPhone: Don't Trust the Client

August 6, 2007
A timeless lesson applies to the iPhone: If something is under the control of a user, we must assume it will be tampered with.
READ MORE

Those "Helpful" Emails that Big Tech Firms Send

July 10, 2007
They appear to be valid - though it’s hard to say. But all they do is sow confusion. What are they thinking?
READ MORE

Will the iPhone be a Security Nightmare?

June 12, 2007
Sure, it will be pretty. But hackers are waiting for it just as eagerly as the gadget geeks.
READ MORE

We All Weep for WEP

May 4, 2007
What can we learn from the epic failure of Wired Equivalent Privacy?
READ MORE

Stakes are High for Vista Security

April 9, 2007
As the first Vista-related security snafus emerge, all eyes are on the OS update. Will Redmond’s new Security Development Lifecycle (SDL) hold up?
READ MORE

Linux vs. Windows: Which is Most Secure?

March 16, 2007
A point by point comparison of the two OSes, with a subjective conclusion as to which offers better security. Plus: some thoughts on Apple security.
READ MORE

Mac vs. Linux: Which is More Secure?

February 28, 2007
A feature-by-feature comparison of the two OSes, with a highly subjective conclusion as to which is better.
READ MORE

Is the Mac Really More Secure than Windows?

February 6, 2007
A security expert looks under the hood of both systems to explore their relative strengths and weaknesses.
READ MORE

Security 2007: Issues to Be Aware Of

January 9, 2007
Some thoughts on this year’s security trends: Mac/Linux vs. Windows, DRM, e-mail snafus, and more.
READ MORE

Warning: Don't Say the King Has No Clothes

December 5, 2006
Rather than criminalizing those that point out the bugs and flaws in our systems, let’s fix the problems.
READ MORE

The Security Snooze Button

November 7, 2006
IT security pros must get involved in software development and help ensure that security is being represented at every stage.
READ MORE

The Rise of Patch Vigilantism

October 2, 2006
An ad hoc group of computer security professionals is producing patches for vendor software. But is this a good thing?
READ MORE

Don't Ignore Device-Driver Dangers

September 11, 2006
Device drivers are a soft underbelly of our operating systems that have been overlooked for far too long, says eSecurity Planet columnist Ken van Wyk.
READ MORE

Getting to the Root of Rootkits

August 7, 2006
There are no guarantees in the ongoing battle against rootkits and other malware, but there are steps you can take to reduce your risk.
READ MORE

IT Must Help Developers Build In Security

July 5, 2006
IT security pros need to be active participants in the software development process, writes our eSecurity Planet columnist.
READ MORE

Let's Practice What We Preach

June 5, 2006
Hardly anyone actually uses digital signatures on their email, even many security professionals. That needs to change, says columnist Ken van Wyk.
READ MORE

Wield App Firewalls with Caution

May 1, 2006
eSecurityPlanet Columnist Ken van Wyk takes a look at application firewalls -- what's bad about them and where they might be useful.
READ MORE