HOME   SPEAKING GIGS   ABOUT / CONTACT    

Delayed Reaction

Despite the ubiquity of the Trusted Platform Module, holdups exist and adoption remains slow.
SCMagazine, February, 2013
 

Waking the sleeping giant: Critical infrastructure

Stuxnet was a game changer, but control systems that run the nation's infrastructure are still at risk.
SCMagazine, November, 2012
 

Cyber Cold War: Espionage and Warfare

In a historic turn, the U.S. government is asking for help in fighting an increasingly sophisticated cyber enemy.
SCMagazine, September, 2012

Code surety: Secure by design

Total security of applications is probably a pipe dream. However, starting a secure design framework today will markedly improve applications in the future.
SCMagazine, March, 2012
 

Cyber beacons: The challenges of new technologies

Information isn't just leaking, it's being broadcast over Web 2.0 mediums
SCMagazine, February, 2012

Safe development: Safeguarding web applications

To secure web applications, makers must take ownership of their lifecycle management.
SCMagazine, November 2011
 

Breaking the next case

Ever-evolving strategies and technologies are just some of the issues facing today's cybercrime investigator.
SCMagazine, September 2011

Federation 2.0: An identity ecosystem

Federated identity, the process of authenticating someone across multiple IT systems and organizations, is taking on new meaning with the growth of cloud and mobile.
SCMagazine, July, 2011
 

Safety in the cloud: Cloud-based services

With more organizations hesitant to entrust their sensitive data to the cloud and a handful of high-profile breaches, providers are augmenting their protections capabilities.
SCMagazine, June 2011

Embrace change:

How security translates to business.
SCMagazine, May, 2011
 

Feeding frenzy: M&A activity in IT security

With an improving economy, security companies are being scooped up by larger firms at a brisk pace.
SCMagazine, March, 2011

Cybercrime: Narrowing the gap

The $1 trillion cybercrime industry is expertly - and competitively - run. Take a peek into the inner workings of these syndicates, and learn how enforcement is closing in on cybercrime gangs.
SCMagazine, February, 2011
 

Cyberthreats: A long haul

Enterprises are under constant seige from cyberthreats that continue to evolve to new levels of sophistication.
SCMagazine, December, 2010

Good & evil: Deep packet inspection

Has the time come to take retaliatory action against digital attacks? And if so, where is the line drawn?
SCMagazine, October, 2010
 

Investigating cybercrime

The real-life tales of how authorities hunted down some of the nation's most dangerous digital crooks.
SCMagazine, September, 2010

Anti-hack: Retaliatory action against digital attacks

Has the time come to take retaliatory action against digital attacks? And if so, where is the line drawn?
SCMagazine, July, 2010
 

E-health records: Embracing privacy

There are strategies to cope with customer expectations of privacy when there are no boundaries around their data.
SCMagazine, June, 2010

Nurturing CSO Careers

Where do C-level security careers lead to and how do you maintain them?
SCMagazine, May, 2010
 

Global village

Testing competitions can improve code, but crowdsourcing brings new concerns to security governance.
SCMagazine, March, 2010

Cloud shift: Weighing the risks and benefits of a new technology

Can security be better in the cloud? Experts believe it can.
SCMagazine, January 2010
 

Electronic Payments: Hurricane Gonzalez

Despite the prosecution of hacker Albert Gonzalez, more needs to be done to secure credit card transactions.
SCMagazine December, 2009

What's old is new again

Today, criminals are using amped-up techniques to tap into a perpetual cycle of fraud and identity theft.
November, 2009
 

Zero Tolerance for Bugs

Static analysis provides a through examination of code, allowing testers to see problems and descriptions of their impact on security.
SD Times, August, 2008

Targeting browsers

Web browsers of every brand and flavor are falling victim to financially motivated attacks.
August, 2009
 

The cybercriminal underground: Commercial sophistication

Malware builds across an underground infrastructure that rivals any legitimate form of commerce.
SC Magazine, April, 2009

Database security: Protecting the crown jewels

Universities, banks, SMBs and large brands alike are waking up to the fact that their databases are no longer safe ...
SC Magazine, February, 2009
 

Security Capital: Funding & Innovation

The pool of venture capital for IT security is dwindling, but spending for security is rising. This created opportunities.
SC Magazine, February, 2009

Head in the Clouds

The latest craze in cloud computing shows great promise, but it is introducing a host of new security issues.
SC Magazine, November, 2008
 

Data Classification 101

The foundation of data-centric protection is knowing what data needs what level of protection.
StateTech Magazine, October, 2008

Information and Network Protection: Finding the right mix

How to secure critical and regulated data when network defenses aren't enough.
Networkworld, October 9, 2008
 

Portrait of a hacker

The underground network of criminally-oriented hackers and cyber profiteers are under more pressure from law enforcement.
SC Magazine, September 26, 2008

Slurping the USB Port

Portable media devices are being used to lift corporate data.
SC Magazine, September, 2008
 

The Life and Death of a Virtual Machine

If IT managers aren't careful, the failure to manage virtual machines throughout their life cycles could erase virtualization's benefits.
Networkworld, August, 2008

A Fine Line

Institutions of higher learning encourage openness on their networks, but find they must impose controls.
SC Magazine, August, 2008
 

How to root out Rootkits

Find out how and where they hide, what they're hiding, and how you can (and can't) stop them.
Networkworld, August, 2008

  Copyright © 2014 Deb.Radcliff       « HOME »   NEXT