Trends
Big Data
Data Center
AI
Cloud
Applications
Mobile
Open Source
Security
Storage
Networks
ERP
Careers
Search
Friday, March 29, 2024
Facebook
Twitter
Youtube
Trends
Big Data
Data Center
AI
Cloud
Applications
Mobile
Open Source
Security
Storage
Networks
ERP
Careers
More
Search
Home
Authors
Posts by Kenneth van Wyk
Kenneth van Wyk
About
Recent Articles
Cybersecurity Best Practice: Guilty Until Proven Innocent
Security
September 8, 2008
Perhaps guilty until proven innocent isn’t so bad an idea after all. It’s often been said the “lawlessness” of the...
How to Prevent a Coffee Shop Wi-Fi Attack
Security
August 4, 2008
The world just got a bit riskier for us “road warriors.” You see, there’s this perfect...
Browser Security: IE vs. Safari vs. Firefox
Security
July 8, 2008
When browsing the net, I’m safest when I’m using Mozilla’s Firefox 3.0 browser—at least after I’ve tweaked...
Why Are IT Security Pros so Bad?
Security
June 3, 2008
We really are idiots. Not you and me, of course, but we. Seriously, we are...
Which is More Secure, Leopard or Vista?
Security
May 9, 2008
Back in February 2007, I wrote that, “I’m more secure on a Mac than I was on...
Security Threat: Cross Site Request Forgery (CSRF)
Security
April 9, 2008
The Boeing Dreamliner “Security”
Trends
February 6, 2008
The Security Concerns of 2008: Get Ready Now
Security
January 8, 2008
Google’s Android vs. Apple’s iPhone: Which is More Secure?
Security
December 3, 2007
I’m going to go out on a limb here and predict Google’s Android mobile phone platform is...
Lessons Learned: People in Glass Houses Shouldn’t Brick Phones
Security
November 14, 2007
1
2
3
4
Page 2 of 4