Overheard: Word of the Day:

Security


September 21, 2009  6:31 PM

Overheard – Security information management (SIM)



Posted by: Margaret Rouse
security information management, SIM

Bookmark and Share     0 Comments     RSS Feed     Email a friend

August 18, 2009  4:22 PM

Overheard – RealDVD and the power of the MPAA



Posted by: Margaret Rouse
Digital rights management, intellectual property, iPod, Video

Bookmark and Share     0 Comments     RSS Feed     Email a friend


July 13, 2009  5:14 PM

Overheard – BIOS attack



Posted by: Margaret Rouse
BIOS attack, Hardware, Security, Sherri Davidoff

Bookmark and Share     0 Comments     RSS Feed     Email a friend


July 10, 2009  3:32 PM

Overheard – Distributed denial of service attack



Posted by: Margaret Rouse
cyberwar, Dave Dittrich, DDoS, denial of service attack, Security

Bookmark and Share     0 Comments     RSS Feed     Email a friend


July 1, 2009  1:29 PM

Overheard – Bugging HTML email



Posted by: Margaret Rouse
HTML email, Security, web beacon, web bug

eric lai Hewlett-Packard Co. admitted several years ago to using Web bugs to spy on reporters during an internal...


June 10, 2009  2:57 PM

Pen testing – poking around a sauna to find holes



Posted by: Margaret Rouse
ethical hacking, pen testing, penetration testing, Security

Most security assessments follow a structured methodology in that an initial meeting is held, an agreement is...


May 13, 2009  5:36 PM

PCI DSS – protecting your credit and debit cards



Posted by: Margaret Rouse
Compliance, PCI DSS, Security

Bookmark and Share     0 Comments     RSS Feed     Email a friend


April 29, 2009  3:55 PM

VM escape – using the hypervisor as an attack vector



Posted by: Margaret Rouse
botnet, DMZ, hypervisor, Security, Virtualization, zombie army

posey Granted, no virtual machine escape hacks exist today, but if the IT security experts are right and this type...


April 24, 2009  3:01 PM

Kanban – a way to visualize bottlenecks in your software development project



Posted by: Margaret Rouse
Agile development, enterprise risk management, extreme programming, kanban, lean management, lean production, lean software development, theory of constraint

Bookmark and Share     0 Comments     RSS Feed     Email a friend


April 8, 2009  5:37 PM

Gap analysis – a security tool you need to use at least once a year



Posted by: Margaret Rouse
gap analysis, Security

Bookmark and Share     0 Comments     RSS Feed     Email a friend


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: