dcsimg

Kenneth Van Wyk - Article Archives - Page 3

Are Hackers Going Beyond Zero-Day Attacks?

April 3, 2006
eSecurityPlanet Columnist Ken van Wyk was surprised by the sophistication of a recent phishing attack. Will hackers soon be moving beyond zero-day attacks into 'neg-day' attacks?
READ MORE

Lessons Learned from Death of the Telegraph

March 6, 2006
eSecurityPlanet columnist Ken van Wyk looks at the life, and death, of the telegraph and talks about what we can learn from it.
READ MORE

Making a Stand for Software Consumer Rights

February 7, 2006
Columnist Ken van Wyk writes an open letter to software vendors, telling them their applications are guests on his machine and they should be acting that way.
READ MORE

Private Patch for .WMF Bug Raises More Concerns

January 5, 2006
Columnist Ken van Wyk says the release of a private patch for the .WMF bug raises some concerns and even more questions.
READ MORE

Email Security and Passwords -- It's Time for Change

January 3, 2006
Columnist Ken van Wyk says it's about time we make some progress when it comes to passwords and email security.
READ MORE

Separating Functions makes Desktops Safer

December 6, 2005
Columnist Ken van Wyk says operating systems would be safer places if we did a better job separating the functions of software installation and software execution.
READ MORE

Developers Held Liable for Software Bugs?

November 7, 2005
Columnist Ken van Wyk talks about the notion that developers should be held liable for bugs in their software? Is this the right road to better security?
READ MORE

Software Bugs: To Disclose or Not to Disclose

October 3, 2005
Columnist Ken van Wyk takes on the question of whether to disclose software defects. What's best for the industry? Who gets hurt?
READ MORE

Security Tips from an Embattled Road Warrior

September 6, 2005
eSecurityPlanet columnist Ken van Wyk tells us how to protect our data when we're on the road... whether we're using a laptop, a PDA or a smart phone.
READ MORE

Open or Closed Source Code Irrelevant to Security

August 1, 2005
Datamation columnist Ken van Wyk looks at the debate over open source code and proprietary software. Which one makes for better security? The answer is that either one can build weak software.
READ MORE

Don't Get Burned by ''Allow Everything'' Attitude

July 5, 2005
Columnist Ken van Wyk looks at two different ways to view network traffic -- allow everything and deny everything. And the choice goes beyond network configuration.
READ MORE

Paranoid or Just Securing Your Data?

May 31, 2005
eSecurityPlanet columnist Ken van Wyk says friends and family tell him he's paranoid. But who has the secure network?
READ MORE

Updating our Thinking on Software Updates

May 3, 2005
eSecurityPlanet columnist Ken van Wyk looks at the issue of software updates -- particularly the lack there of for mobile devices.
READ MORE

How to Protect a Vanishing Perimeter?

April 4, 2005
Columnist Ken van Wyk says the idea of a perimeter is quickly fading away. And considering it a solid border is a dangerous way of thinking. Now, it's time, he says, to focus on the software.
READ MORE

Time to Trade in Geek Speak for Business Lingo

March 22, 2005
Our eSecurityPlanet columnist Ken van Wyk says if you're talking tech to your boss, you might as well be speaking Elvish. To get things done, you need to learn biz speak.
READ MORE

Digital Signatures Key to Solving Email Woes

January 31, 2005
Some say spam and phishing schemes are killing email. Columnist Ken van Wyk says the key to saving it is to start using digital signatures.
READ MORE

Protecting the Enterprise from Users' New, Cool Tools

January 3, 2005
As employees head back to the office, many of them will be coming in with new, cool gadgets in hand -- straight from Santa's sack. Could these new smart phones, PDAs and MP3 players be a security risk? Yes, they can, and here's what to do about it.
READ MORE

Be Better Prepared for the Coming Disaster

November 29, 2004
eSecurityPlanet's columnist Ken van Wyk says we should take a page from the history books -- the anniversary of the Morris Internet Worm to be exact. Heed these lessons when planning Incident Response.
READ MORE

Improving Data Center Security... Simply

November 2, 2004
Are you looking to improve the security of your data center, but are a little confused? eSecurityPlanet's Ken vanWyk walks you through some improvements.
READ MORE