Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Blog Directory  >  Business Blogs  >  Companies Blogs  > companies Blog  > Blog
Commentary, reviews, and tips relevant for anyone responsible for information security.
2007-02-17 19:43
Unbelievable.  It’s even more unbelievable because I live near the community of Oregon, Ohio where a police detective called a student’s iPod a “criminal tool”… Read More
2007-02-17 19:00
I was reading a Tim Wilson article at Dark Reading this morning in which he asked the question, “So are users hopeless?  Are they inherently brainless and/or evil?”&nbs&hell…Read More
2007-02-16 16:03
Yes, the title is in all caps.  Yes, I’ll yelling as loudly as I can.  In a recent column at, Bill Brenner reiterates the dangers of using Telnet over con… Read More
2007-02-16 15:54
In a recent blog entry at, Joanna posted her comments on Vista UAC and integrity levels after having used the OS for more than a month.  Interesting reading Read More
2007-02-16 15:28
Cross site scripting (XSS) is a big problem in web application environments.  In fact, the 2007 OWASP Top Ten list of web application vulnerabilities has XSS at #1.  In a recent pa… Read More
2007-02-15 18:49
______________________________________________________ Check out my book, Just Enough Security, at Additional security management resources are available at http://adventures… Read More
2007-02-15 18:44
In this Geekzone article, Darryl Burling ponders the value of putting risk management on the user.  I don’t know about you, but relying on users to protect data, even their own, i… Read More

Share the post


Subscribe to

Get updates delivered right to your inbox!

Thank you for your subscription