Tuesday, October 19, 2021

Kenneth van Wyk

Email Security and Passwords — It’s Time for Change

I'm going to buck tradition a bit here. Instead of focusing on what happened this year or what might happen next year, I'm going to focus my...

Separating Functions makes Desktops Safer

Unless you've been visiting some other planet, it's more than likely you've heard or read about the so-called 'rootkit' software that was found on some copy protected...

Developers Held Liable for Software Bugs?

Hold software developers liable for security defects in their products! Well, that's what former White House and Microsoft security advisor Howard Schmidt says, anyway. For sure, I've seen so...

Software Bugs: To Disclose or Not to Disclose

It's the age-old battle of security: to disclose or not to disclose software defects. The proverbial pendulum of opinion has been swinging back and forth on this issue...

Security Tips from an Embattled Road Warrior

During the past few months, I've reverted back to being a ''road warrior'' of sorts. Apart from spending far too much time with my 1K buddies over...

Paranoid or Just Securing Your Data?

We've all heard it -- perhaps even from our friends, family or colleagues. 'You're being too paranoid,' they tell us when we explain to them how we've...

How to Protect a Vanishing Perimeter?

Batten down the hatches! Raise the drawbridge! Kind of sounds funny in today's Information Technology context, doesn't it? However, it should at least sound familiar to many of...

Digital Signatures Key to Solving Email Woes

Looking for a great rate on a mortg(ag)e? Neither am I. But, judging from the number of such emails that find their way into my spambox -- (Thank You, Spamassassin!) -- a...

Protecting the Enterprise from Users’ New, Cool Tools

As you read this, users are winding up their holidays and heading back to the office. The trouble is that they're bringing security risks with them --...

Latest Articles