![]() |
||||
![]() |
HOME | SPEAKING GIGS | ABOUT / CONTACT |
Of Avatars and Mob Justice: Invasion of Privacy, or Just Desserts?: Informit.com Aug 12, 2005 - A group that calls itself Perverted-Justice is going after suspected pedophiles by luring them into chats with adult hackers acting as underage girls. A worthy cause, yes. But should they be acting as judge, jury and executioner without due process? |
How to prevent pharming: Network World July 18, 2005 - Protect your company's online reputation by locking down DNS and guarding against domain hijacking. | |
Get Smart on Web Application Security: DevSource July 14, 2005 - Web applications are the latest gold mine for criminals bent on gathering valuable corporate and consumer data. |
Radcliff wins TABPI award: networklife June 30, 2005 - Network security writer Deb Radcliff produces the "Security Chief" Network Life column with advice about how best to safeguard home networks from the ever-shifting threats such as rampant viruses and worms, spyware and phishing. | |
Don't ditch the landline yet: Network World June 6, 2005 - Security Chief: Home VoIP is cool, but needs safety and reliability fixes first. |
Fighting back against phishing: Network World April 11, 2005 - In the past year, attacks have grown in volume and sophistication, but online merchants are on the offensive with consumer education and new authentication tools. | |
Hooking a phisher: Network World April 11, 2005 - See how the FBI works with Internet companies to track and catch the bad guys Phish facts and figures |
Security automation: The next wave: Network World March 21, 2005 - Beyond virus protection and patch management. | |
Radcliff Picked as FBTW President: fbtw.org Jan. 12, 2005 - Freelance Business and Technology Writers Association elected Deborah Radcliff to lead the organization through the new year. Radcliff is an experienced, two-time Neal Award-winning technology writer who freelances for NetworkWorld, SecurityFocus and other business technology journals. Formerly a staff feature writer for Computerworld, she is now also writing a personal online safety column and working on a book. |
Fake network gear: networkworld.com Oct 23, 2006 - Counterfeit goods have popped up in the channel and could be in your organization. | |
The 21st-century CSO: EnterpriseLeadership.org July 7, 2006 - Poineering CSOs at Nortel and TriWest describe their evolution into converged enterprise systems and corporate risk management, mapping out risk management structures adoptable by any organization as complex as theirs. |
Remote control wars: scmagazine.com June 6, 2006 - Millions of remote controlled 'bot' computers are being found in networks of tens of thousands of computers to send Spam, log keystrokes, relay phishing information, and other nefarious urposes. | |
Smart Attacks Call for Smarter Measures - Part 1: enterpriseleadership.org May 22, 2006 - Smart devices have become the latest attack vector for online criminals, putting intellectual property, regulated and personal financial information stored on them at risk. In this three-part article, uthor Deb Radcliff explores these new attack vectors into the enterprise. |
Sport phishing morphs into cybercrime wave: networkworld.com May 22, 2006 - Organized criminals unleash armies of botnets to steal confidential information. | |
TalkingPortraits: talkingportraits.com Apr, 2006 - Deb Radcliff talks about computer crime and remote controlled botnets. |
Protecting data throughout its life cycle: Networkworld.com Mar 20, 2006 - Data life-cycle protection is becoming just as important in New Data Center architectures as network security, but challenges abound. | |
Mining SIM: Networkworld.com Nov 21, 2005 - Security information management helps the Mine Safety and Health Administration boost its security score from F to B. |
After a security breach: Networkworld.com Oct 24, 2005 - Every network is vulnerable to some type of attack. The important thing is how you respond. | |
Deb Radcliff talks about security in VentureMomentum e-zine: venturemomentum.com Oct. 12, 2005. |
Digging out new rootkits: Networkworld.com Sep 26, 2005 - These attacker tools have become stealthier than ever. Even so, they may not require specialized protection. |
Copyright © 2009 Deb.Radcliff | ← BACK « HOME » NEXT → |