Deb Radcliff

Recent articles by Deb Radcliff

Trusted Platform Module woes

Trusted Platform Module woes

Despite the ubiquity of the Trusted Platform Module, holdups exist and adoption remains slow. Among them are issues with interoperability, considering Apple, Google and Microsoft all use different standards.
Feb 5 2013 10:19AM
Code surety: Secure by design

Code surety: Secure by design

Total security of applications is probably a pipe dream. However, starting a secure design framework today will markedly improve applications in the future, reports Deb Radcliff.
Mar 7 2012 5:34AM
Securing the Web 2.0 enterprise

Securing the Web 2.0 enterprise

Analysis: Information isn't just leaking, it's being broadcast.
Feb 6 2012 12:00PM
Chasing hackers and hacktivists

Chasing hackers and hacktivists

Cybercrime investigators face new technologies and strategies, reports Deb Radcliff.
Sep 5 2011 10:07AM
Federated Identity flourishing

Federated Identity flourishing

Standards are maturing just in time for identity federations to meet the new demands for cloud and mobile access.
Jul 12 2011 2:18PM
Building safety into the cloud

Building safety into the cloud

With more organizations hesitant to entrust their sensitive data to the cloud and a handful of high-profile breaches, providers are augmenting their protections capabilities.
Jun 2 2011 11:06AM
Database security: protecting the crown jewels

Database security: protecting the crown jewels

As companies like Deutsche Telekom have learned, attackers are going after databases, reports Deb Radcliff.
Feb 12 2009 4:45PM
Warrantless wiretapping: blame it on technology

Warrantless wiretapping: blame it on technology

A panel at RSA explores wiretapping and the legal ramifications for ISPs.
Apr 11 2008 1:58AM
RSA '08: Art Caveillo's keynote highlights data centric security

RSA '08: Art Caveillo's keynote highlights data centric security

Technical innovations, coupled with regulations, more sophisticated attacks and gaps between technology deployed and the knowledge of the users continue to grow larger, Art Coveillo Jr., president of RSA, said in his keynote address at the RSA Conference.
Apr 9 2008 7:18AM
Remote control wars

Remote control wars

Monitoring an illicit Internet Relay Chat (IRC) channel recently, Nicholas Albright couldn’t believe what he was seeing. First, he observed a network operator sending commands to install keyloggers on thousands of compromised, remote-controlled computers. Then, all this private data started flying over the channel — HIPAA-protected medical information, financial account numbers, usernames and passwords.
Jun 6 2006 7:47PM

Log In

Username:
Password:
|  Forgot your password?