Online Security: What’s your approach?

In the rush to get online, many companies consider security as an afterthought. The hurry to develop an online presence causes them to overlook the obvious… they could …

Passwords – The Weak Link

A chain is only as strong as its weakest link. In the security world, that weak link is the human element, and it manifests in the poor management of user passwords. As our …

Code Red: As Bad As It Gets?

If you haven’t heard about Code Red by now you must have been in hibernation! This most recent worm has fueled the old debate on “Full Disclosure”. Many …

Risk e-Business

Well, it’s finally happened. I had my first close encounter with real life crackers! A good friend of mine recently went to work for a small Internet startup company (I …

A Comment on Bugtracking

On November 20, 2000, I was sent an e-mail by someone who called himself Zorgon. It read: CGIForum is a free forum. We can set `thesection’ parameter to view files on …

Issues: “Save a bug, safe a life?”

“And there’s the sign, Ridcully,” said the Dean. “You HAVE read it, I assume. You know? The sign which says “Do not, under any circumstances, …