Friday, April 16, 2021

Kenneth van Wyk

Windows 7 vs. Snow Leopard: Which is More Secure?

I’ve said here before that, “I’m more secure on a Mac than I was on Windows.” But now we have a couple new(ish) kids...

How to Be Safer on Twitter

“Twitter is insecure. Twitter is the root of all evil.” Right. Much has indeed been written about Twitter’s security – or lack thereof– in just the...

How to Make Your iPhone Secure

I upgraded last month from Windows 1.0 to Apple’s OS X. OK, I didn’t really, but it sure felt like I did. Transitioning...

How to Use Facebook Safely

Love them or hate them; social networking sites are here to stay. And your users are going to find ways to use them from...

Cell Phone Security Updates: Voluntary or Involuntary?

Wireless security has been getting pushy recently. But seriously: Do you think we’re more secure? What caught my eye was a headline about a mobile phone...

OWASP: Helping Web Developers Develop Securely

We’re bombarded with news of security breaches, security vulnerabilities, and products that aim for some arguably novel approach at stopping something bad from happening to us. ...

Van Wyk on the ‘Top 25 Programming Errors’

Last week the SANS Institute and MITRE together published their CWE/SANS Top-25 Most Dangerous Programming Errors list. Ta dah! Wow, that “ta dah” didn’t...

Security Nightmare in the iPhone App Gold Rush

There’s a gold rush going on out there before our eyes. What, you haven’t noticed? Perhaps you’ve been too busy watching the gloom and doom on Wall...

Security Watch: Problems with Penetration Testing

Penetration testing is as popular as ever, yet it continues to miss the mark. As a means of validating the security of an application system, it...

When Did Security Pros Forget the User?

When did we forget about the users? At some point, it seems to me that the security community simply forgot about the users. I want...

Cybersecurity Best Practice: Guilty Until Proven Innocent

Perhaps guilty until proven innocent isn’t so bad an idea after all. It’s often been said the “lawlessness” of the Internet is similar to the American “Wild West.”...

How to Prevent a Coffee Shop Wi-Fi Attack

The world just got a bit riskier for us “road warriors.” You see, there’s this perfect storm of risks lined up to make our...

Latest Articles

IT Planning During a Crisis

Without a doubt, 2020 changed everything. I like to compare it to a science fiction movie where time travel is involved. Clearly, we have...

Best Data Quality Tools &...

Data quality is a critical issue in today’s data centers. The complexity of the Cloud continues to grow, leading to an increasing need for...

NVIDIA’s New Grace ARM/GPU Solution...

This week is NVIDIA’s GTC, or GPU Technology Conference, and they likely should have changed the name to ATC because this year – it...

What is Data Segmentation?

Definition of Data Segmentation Data segmentation is the process of grouping your data into at least two subsets, although more separations may be necessary on...