Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Blog Directory  >  Business Blogs  >  Companies Blogs  >  adventuresinsecurity.com companies Blog  > 

Adventuresinsecurity.com Blog


adventuresinsecurity.com/blog
Commentary, reviews, and tips relevant for anyone responsible for information security.
2007-02-17 19:43
Unbelievable.  It’s even more unbelievable because I live near the community of Oregon, Ohio where a police detective called a student’s iPod a “criminal tool”… Read More
2007-02-17 19:00
I was reading a Tim Wilson article at Dark Reading this morning in which he asked the question, “So are users hopeless?  Are they inherently brainless and/or evil?”&nbs&hell…Read More
2007-02-16 16:03
Yes, the title is in all caps.  Yes, I’ll yelling as loudly as I can.  In a recent column at seearchsecurity.com, Bill Brenner reiterates the dangers of using Telnet over con… Read More
2007-02-16 15:54
In a recent blog entry at invisiblethings.com, Joanna posted her comments on Vista UAC and integrity levels after having used the OS for more than a month.  Interesting reading Read More
2007-02-16 15:28
Cross site scripting (XSS) is a big problem in web application environments.  In fact, the 2007 OWASP Top Ten list of web application vulnerabilities has XSS at #1.  In a recent pa… Read More
2007-02-15 18:49
______________________________________________________ Check out my book, Just Enough Security, at Amazon.com Additional security management resources are available at http://adventures… Read More
2007-02-15 18:44
In this Geekzone article, Darryl Burling ponders the value of putting risk management on the user.  I don’t know about you, but relying on users to protect data, even their own, i… Read More

Share the post

adventuresinsecurity.com

×

Subscribe to Adventuresinsecurity.com

Get updates delivered right to your inbox!

Thank you for your subscription

×