Anonymous is not anonymous

August 13, 2013
At this point, most of us would welcome shelter from the gaze of government cyber spies. Here are six reasons why that may be unattainable
Read more »

Detect the undetectable: Start with event logs

August 06, 2013
Security event monitoring systems are often plagued by signal-to-noise problems. Here's how to ensure they produce meaningful alerts
Read more »

Should you create a separate, supersecure network?

July 30, 2013
A safe deposit box protects your valuables -- so why not shield your critical data in an ultrasecure network? It's not that simple
Read more »

Stop 80 percent of malicious attacks now

July 23, 2013
Guess which two pieces of unpatched software provide points of entry for most security breaches. (Hint: They're not Windows)
Read more »

The one security technology that actually works

July 16, 2013
Antivirus, perimeter defense, and network monitoring are jokes. But whitelisting works once you clear the political and logistical hurdles
Read more »

In his own words: Confessions of a cyber warrior

July 09, 2013
A longtime friend working as a cyber warrior under contract to the U.S. government provides a glimpse of the front lines
Read more »

Stop your privacy from being buried alive

July 02, 2013
Edward Snowden's revelations have shocked few, but it should still spur us to fight for our constitutional right to privacy
Read more »

Why bug bounties aren't a cure for broken software

June 25, 2013
Microsoft joins other vendors in rewarding those who privately report software vulnerabilities -- but that may not reduce customer risk
Read more »

It's over: All private data is public

June 18, 2013
Enough about the NSA -- any hacker worthy of the name can snatch your 'private' data. Either stop entrusting it to anyone or chill out
Read more »

Boost your Internet security with DNSSec

June 11, 2013
DNS has been around so long, opportunities to use it as an attack vector are rife. Here's how to lock it down painlessly
Read more »
©1994-2014 Infoworld, Inc.