Information Security Leader, Author, Instructor and Speaker

Default utility Image

Drive-By Downloads TAGS: | You’ve installed antivirus software on your computer and are careful to avoid sketchy websites.  You should be safe from malware …Continue reading →

Default utility Image

Getting a Handle on Digital Certificates TAGS: | | It’s happened to all of us — at 4AM the phone rings and we find someone from operations on the …Continue reading →

Default utility Image

Securing Your Website with Digital Certificates TAGS: | | Website users are trained to recognize the signs and symbols of a secure website — from the HTTPS in the …Continue reading →

Default utility Image

WAFs, SDLC and PCI Compliance TAGS: | | Web applications remain one of the most vulnerable parts of our computing infrastructure.  We’ve taken extraordinary measures over the past …Continue reading →

Default utility Image

Defending against Firesheep: How to prevent a session hijacking attack TAGS: | Session hijacking is a common form of attack against websites. Hackers using this attack are able to take advantage of …Continue reading →

Default utility Image

Encrypting and securing websites with HTTPS TAGS: | | You might know that it’s possible to secure a website with encryption technology, but do you know what that “S” …Continue reading →

Default utility Image

Product Review: Application Security Inc.’s AppDetectivePro TAGS: | AppDetectivePro fills a critical niche that goes beyond conventional vulnerability scanners, performing “deep dive” inspections of database configuration to identify …Continue reading →

Default utility Image

Hacking the Vote: Information Security and the 2008 Presidential Election TAGS: | I had the opportunity to share my thoughts on the role that information security might play in the upcoming election …Continue reading →

Default utility Image

Building application firewall rulebases TAGS: | During the past decade, most enterprises have made significant investments in network and perimeter security. Organizations have tightened their controls …Continue reading →

Default utility Image

Deal with cross-site scripting TAGS: Cross-site scripting is a serious security issue facing Web developers. This exploit allows malicious Web site operators to abuse the …Continue reading →