Deb Radcliff

Recent articles by Deb Radcliff

Trusted Platform Module woes

Trusted Platform Module woes

Despite the ubiquity of the Trusted Platform Module, holdups exist and adoption remains slow. Among them are issues with interoperability, considering Apple, Google and Microsoft all use different standards.
Deb Radcliff Feb 5 2013 10:19AM Security
Code surety: Secure by design

Code surety: Secure by design

Total security of applications is probably a pipe dream. However, starting a secure design framework today will markedly improve applications in the future, reports Deb Radcliff.
Deb Radcliff Mar 7 2012 5:34AM Security
Securing the Web 2.0 enterprise

Securing the Web 2.0 enterprise

Analysis: Information isn't just leaking, it's being broadcast.
Deb Radcliff Feb 6 2012 12:00PM Security
Chasing hackers and hacktivists

Chasing hackers and hacktivists

Cybercrime investigators face new technologies and strategies, reports Deb Radcliff.
Deb Radcliff Sep 5 2011 10:07AM Security
Federated Identity flourishing

Federated Identity flourishing

Standards are maturing just in time for identity federations to meet the new demands for cloud and mobile access.
Deb Radcliff Jul 12 2011 2:18PM Security
Building safety into the cloud

Building safety into the cloud

With more organizations hesitant to entrust their sensitive data to the cloud and a handful of high-profile breaches, providers are augmenting their protections capabilities.
Deb Radcliff Jun 2 2011 11:06AM Security
Database security: protecting the crown jewels

Database security: protecting the crown jewels

As companies like Deutsche Telekom have learned, attackers are going after databases, reports Deb Radcliff.
Deb Radcliff Feb 12 2009 4:45PM Security
Warrantless wiretapping: blame it on technology

Warrantless wiretapping: blame it on technology

A panel at RSA explores wiretapping and the legal ramifications for ISPs.
Deb Radcliff Apr 11 2008 1:58AM Security
RSA '08: Art Caveillo's keynote highlights data centric security

RSA '08: Art Caveillo's keynote highlights data centric security

Technical innovations, coupled with regulations, more sophisticated attacks and gaps between technology deployed and the knowledge of the users continue to grow larger, Art Coveillo Jr., president of RSA, said in his keynote address at the RSA Conference.
Deb Radcliff Apr 9 2008 7:18AM Security
Remote control wars

Remote control wars

Monitoring an illicit Internet Relay Chat (IRC) channel recently, Nicholas Albright couldn’t believe what he was seeing. First, he observed a network operator sending commands to install keyloggers on thousands of compromised, remote-controlled computers. Then, all this private data started flying over the channel — HIPAA-protected medical information, financial account numbers, usernames and passwords.
Deb Radcliff Jun 6 2006 7:47PM Security

Log In

  |  Forgot your password?