Information Security Leader, Author, Instructor and Speaker

Default utility Image

Detecting hack attacks: Application logging is critical TAGS: | | Application servers house a wealth of valuable data. They store your organization’s Web pages, serve as the gateway to critical …Continue reading →

Default utility Image

Mini-tutorial: The Java security model TAGS: Many Web-based applications use the Java programming language to create mobile code objects (applets) that execute on the end user’s …Continue reading →

Default utility Image

Blocking IM applications in the enterprise TAGS: | Instant Messaging (IM) applications are a staple of modern communication. If you’re not using AIM, Yahoo! Messenger or a similar …Continue reading →

Default utility Image

Securing Apache: Keeping patches current TAGS: | Security articles in the mainstream technical media often focus on the importance of keeping Web servers patched to the most …Continue reading →

Default utility Image

IIS vs. Apache: Which is the right security choice? TAGS: | Not long ago, Web administrators didn’t have a great deal of input into their organization’s Web server platform. If they …Continue reading →

Default utility Image

ASP.NET authentication: Three new options for Web services TAGS: | Web developers migrating to ASP.NET are about to find themselves faced with new authentication options available for use in Web …Continue reading →

Default utility Image

Web application isolation TAGS: | Over the past few years, Web developers and administrators have become increasingly cognizant of the importance of Web application isolation. …Continue reading →

Default utility Image

Perl taint mode TAGS: One of the most important tasks a security administrator can perform is to ensure that all Web code on a …Continue reading →