Modernizing Authentication — What It Takes to Transform Secure Access
We have added a few things to eSecurityPlanet -- changes designed to give you more information, faster.
Starting this week, you'll discover our new Threat Alert box on the right-hand side of our homepage. There we will keep you updated on the newest viruses, worms and Trojans to hit the wild. We'll also warn you about the worst bugs battering networks around the world.
And as part of our redesign, we'll be offering you insights on the latest and most critical issues in information security. To do that, we have recruited four great minds in the IS field:George Bakos is a Senior Security Expert with the Institute for Security Technology Studies at Dartmouth College. His research includes worm detection and intrusion analysis. Formerly, Bakos was a security engineer for Electronic Warfare Associates.https://l1.cdn.qnsr.com/log/p.gif?;n=203;c=204650394;s=9477;x=7936;f=201801171506010;u=j;z=TIMESTAMP;a=20392931;e=iKenneth van Wyk, a 19-year veteran of IT security, is the principal consultant for KRvW Associates, LLC. The co-author of two security-related books, he has worked at CERT, as well as at the U.S. Department of Defense.Bob Hillery, a former computer and security manager for the U.S. Navy, is a founder of Intelguardians, LLC, a security consultancy. With experience in the corporate, military and academic worlds, he also now is an instructor with the SANS Institute.Ray Everett-Church is a privacy officer with ePrivacyGroup, a privacy and anti-spam consultancy. He also is a founder of CAUCE, a group focused on finding a legislative solution to spam.
We hope you find these changes useful. Here at eSecurityPlanet, we know that our readers have tough jobs, and we're doing what we can to help.