Last Build Date: Sun, 04 Nov 2007 15:00:00 ESTCopyright: ℗ & © 2006 Erudio Security, LLC
Sat, 19 Aug 2006 21:15:00 ESTThe vulnerabilities and safeguards associated with Application Denial of Service and Insecure Configuration Management
Sat, 09 Sep 2006 12:30:00 ESTThe importance of change management, the potential security risks when desperation enters the project lifecycle, how virtual floors can provide secure flexible business-to-business connectivity, and finally, a look at some ways to handle sensitive information once printed copied or faxed.
Sun, 24 Sep 2006 18:25:00 ESTThe importance of choosing the right source for audit artifacts, and the growing threat of employee home PCs to the business enterprise
Mon, 02 Oct 2006 18:30:00 ESTExamination of biometrics in general. Introduction of Keystroke Dynamics as a low impact biometric alternative.
Sun, 15 Oct 2006 08:30:00 ESTCustomer Welfare vs. Vendor Public image, Establishing System Assurance, Cyber-espionage.
Sat, 28 Oct 2006 12:00:00 ESTCommentary on iPods in business, security as a process, and how some programming teams are stepping up to meet security challenges.
Sun, 18 Feb 2007 18:00:00 ESTCommentary on iPods as criminal tools, users are not stupid, AJAX vulnerability monitoring, dangers of pirated software, and Risk Management
Sun, 25 Feb 2007 17:00:00 ESTKey carrying photons, VoIP vulnerabilities, outsourcing security, memory debugging, Exchange DST woes, and hypervisor-based virtual server security
Sun, 4 Mar 2007 08:55:00 ESTVendor bullying, AV software evaluation, Fuzzing, new SPP issue, kernel malware, and data protection
Sun, 18 Mar 2007 15:10:00 ESTBot driven spam, discretionary faxing, quantum leaps, Oracle security, 7 habits of effective security leaders, pros and cons of risk management
Sun, 25 Mar 2007 11:30:00 ESTLosing the war with malware, Xbox support team is a hole in the dyke, College campuses are wide open, External pen tests, Software assurance, and Protecting your laptop from ad hoc wireless networks.
Sun, 01 Apr 2007 11:30:00 ESTWireless RFID encryption, CarderIM, Banker Trojans, Cisco NAC vulnerabilities, data encryption, and NetBIOS challenges.
Sun, 29 Apr 2007 15:20:00 ESTCisco NAC defaults create vulnerability, Vista may be no more secure than XP, Securing and initial processing of a crime scene.
Sun, 13 May 2007 20:30:00 ESTMOICE Office 2003 security plug-in, source routing infests IPv6, the continuing risk of removable storage, preparing for electronic evidence acquisition, preventing data leakage through swap and hibernation files.
Sun, 27 May 2007 18:30:00 ESTAnother government security foul-up, BlueFur Anti-phishing solution, Interpol security checklist, cracking a protected BIOS, and finding "hidden" data.
Sat, 29 Sep 2007 15:25:00 ESTInexpensive lockable USB memory stick, risk management, large Web sites expose authentication tokens, phishing undercover, and attaining network-wide visibility.
Sun, 07 Oct 2007 20:10:00 ESTInformation Security is about protecting the data,desktop application virtualization and application streaming
Sun, 14 Oct 2007 19:45:00 ESTSecurity enhancements in XP SP3, review of native data encryption, properly classifying security tests, Swiss move quantum cryptography into production, and DHS releases IT Security Essential Body of Knowledge.
Sun, 28 Oct 2007 17:00:00 ESTSOX Television, an inexpensive file encryption utility, and using TPM, Bitlocker, and Active Directory to secure laptop data.
Sun, 04 Nov 2007 15:00:00 ESTFinding and dealing with rogue employees, crack WEP in less than 60 seconds, rainbow table LM password cracking, a really naive 419 scam victim, and tips on interviewing insider suspects.