Thursday, July 29, 2021

Kenneth van Wyk

Windows 7 vs. Snow Leopard: Which is More Secure?

I’ve said here before that, “I’m more secure on a Mac than I was on Windows.” But now we have a couple new(ish) kids...

How to Be Safer on Twitter

“Twitter is insecure. Twitter is the root of all evil.” Right. Much has indeed been written about Twitter’s security – or lack thereof– in just the...

How to Make Your iPhone Secure

I upgraded last month from Windows 1.0 to Apple’s OS X. OK, I didn’t really, but it sure felt like I did. Transitioning...

How to Use Facebook Safely

Love them or hate them; social networking sites are here to stay. And your users are going to find ways to use them from...

Cell Phone Security Updates: Voluntary or Involuntary?

Wireless security has been getting pushy recently. But seriously: Do you think we’re more secure? What caught my eye was a headline about a mobile phone...

OWASP: Helping Web Developers Develop Securely

We’re bombarded with news of security breaches, security vulnerabilities, and products that aim for some arguably novel approach at stopping something bad from happening to us. ...

Van Wyk on the ‘Top 25 Programming Errors’

Last week the SANS Institute and MITRE together published their CWE/SANS Top-25 Most Dangerous Programming Errors list. Ta dah! Wow, that “ta dah” didn’t...

Security Nightmare in the iPhone App Gold Rush

There’s a gold rush going on out there before our eyes. What, you haven’t noticed? Perhaps you’ve been too busy watching the gloom and doom on Wall...

Security Watch: Problems with Penetration Testing

Penetration testing is as popular as ever, yet it continues to miss the mark. As a means of validating the security of an application system, it...

When Did Security Pros Forget the User?

When did we forget about the users? At some point, it seems to me that the security community simply forgot about the users. I want...

Cybersecurity Best Practice: Guilty Until Proven Innocent

Perhaps guilty until proven innocent isn’t so bad an idea after all. It’s often been said the “lawlessness” of the Internet is similar to the American “Wild West.”...

How to Prevent a Coffee Shop Wi-Fi Attack

The world just got a bit riskier for us “road warriors.” You see, there’s this perfect storm of risks lined up to make our...

Latest Articles

Data Science Market Trends 2021

When famed mathematician John W. Tukey postulated that advanced computing would have a profound effect on data analysis, he probably didn’t imagine the full...

Data Recovery Market Trends 2021

Data recovery is more important than ever in this era of constant cyber attacks and ransomware. The Verizon Data Breach Investigations Report (DBIR) looked...

Trends in Data Visualization

In a world of big data, visualization is becoming a key skill set that every business must master.  Digital technology has transformed the way businesses...

Microsoft Data Portfolio Review

With a host of analytics services for almost any situation, Microsoft Azure’s data services have got just about every base covered.   In the world...