HOME   SPEAKING GIGS   ABOUT / CONTACT    
Of Avatars and Mob Justice: Invasion of Privacy, or Just Desserts?: Informit.com
Aug 12, 2005 - A group that calls itself Perverted-Justice is going after suspected pedophiles by luring them into chats with adult hackers acting as underage girls. A worthy cause, yes. But should they be acting as judge, jury and executioner without due process?
  How to prevent pharming: Network World
July 18, 2005 - Protect your company's online reputation by locking down DNS and guarding against domain hijacking.
Get Smart on Web Application Security: DevSource
July 14, 2005 - Web applications are the latest gold mine for criminals bent on gathering valuable corporate and consumer data.
  Radcliff wins TABPI award: networklife
June 30, 2005 - Network security writer Deb Radcliff produces the "Security Chief" Network Life column with advice about how best to safeguard home networks from the ever-shifting threats such as rampant viruses and worms, spyware and phishing.
Don't ditch the landline yet: Network World
June 6, 2005 - Security Chief: Home VoIP is cool, but needs safety and reliability fixes first.
  Fighting back against phishing: Network World
April 11, 2005 - In the past year, attacks have grown in volume and sophistication, but online merchants are on the offensive with consumer education and new authentication tools.
Hooking a phisher: Network World
April 11, 2005 - See how the FBI works with Internet companies to track and catch the bad guys Phish facts and figures
  Security automation: The next wave: Network World
March 21, 2005 - Beyond virus protection and patch management.
Radcliff Picked as FBTW President: fbtw.org
Jan. 12, 2005 - Freelance Business and Technology Writers Association elected Deborah Radcliff to lead the organization through the new year. Radcliff is an experienced, two-time Neal Award-winning technology writer who freelances for NetworkWorld, SecurityFocus and other business technology journals. Formerly a staff feature writer for Computerworld, she is now also writing a personal online safety column and working on a book.
  Fake network gear: networkworld.com
Oct 23, 2006 - Counterfeit goods have popped up in the channel and could be in your organization.
The 21st-century CSO: EnterpriseLeadership.org
July 7, 2006 - Poineering CSOs at Nortel and TriWest describe their evolution into converged enterprise systems and corporate risk management, mapping out risk management structures adoptable by any organization as complex as theirs.
  Remote control wars: scmagazine.com
June 6, 2006 - Millions of remote controlled 'bot' computers are being found in networks of tens of thousands of computers to send Spam, log keystrokes, relay phishing information, and other nefarious urposes.
Smart Attacks Call for Smarter Measures - Part 1: enterpriseleadership.org
May 22, 2006 - Smart devices have become the latest attack vector for online criminals, putting intellectual property, regulated and personal financial information stored on them at risk. In this three-part article, uthor Deb Radcliff explores these new attack vectors into the enterprise.
  Sport phishing morphs into cybercrime wave: networkworld.com
May 22, 2006 - Organized criminals unleash armies of botnets to steal confidential information.
TalkingPortraits: talkingportraits.com
Apr, 2006 - Deb Radcliff talks about computer crime and remote controlled botnets.
  Protecting data throughout its life cycle: Networkworld.com
Mar 20, 2006 - Data life-cycle protection is becoming just as important in New Data Center architectures as network security, but challenges abound.
Mining SIM: Networkworld.com
Nov 21, 2005 - Security information management helps the Mine Safety and Health Administration boost its security score from F to B.
  After a security breach: Networkworld.com
Oct 24, 2005 - Every network is vulnerable to some type of attack. The important thing is how you respond.
Deb Radcliff talks about security in VentureMomentum e-zine: venturemomentum.com
Oct. 12, 2005.
  Digging out new rootkits: Networkworld.com
Sep 26, 2005 - These attacker tools have become stealthier than ever. Even so, they may not require specialized protection.

  Copyright © 2009 Deb.Radcliff     ← BACK   « HOME »   NEXT