Access "Reflections on changing information security trends"
When I started covering security in 2000, my day consisted of combing through an inbox full of alerts from Symantec, McAfee and many other security companies, staring down big, scary subject lines about viruses, worms, denial-of-service attacks and website homepages replaced with graffiti. That was the norm at the turn of the century for a security journalist. Hackers were bums, longhairs who fit the cliché of the basement-living, pasty-looking emo kid with too much time on his hands in the suburbs. Companies didn’t have online storefronts; they were just trying to keep their branding pages up and running. Hackers weren’t making money either. They were too busy being the kings and queens of IRC chat rooms to care about stealing credit card numbers, trade secrets and Gmail credentials. Information security trends have evolved as times have changed. The Internet has gone from AOL being everyone’s baby steps into using the Web, to the Internet potentially being the next military battlefield. Twelve years literally is a lifetime of change online. And that’s what... Access >>>
Premium Content for Free.
A new framework for preventing XSS attacks
by Joseph Bugeja and Geraint Price
Understand how cross-site scripting attacks work and how to prevent them.
Security as a Service: Benefits and risks of cloud-based security
by Joseph Granneman
Know the pros and cons to cloud-based security services before making the leap.
- A new framework for preventing XSS attacks by Joseph Bugeja and Geraint Price
Malware analysis tools and techniques failing but researchers aim for improvement
by Robert Westervelt, News Director
Malware analysis is falling short but some security researchers are working to reverse the trend.
Mobile application security best practices in a BYOD world
by Russ McRee, Contributor
Mobile applications are proliferating in the enterprise, posing new risks to enterprises and requiring mitigation.
- Malware analysis tools and techniques failing but researchers aim for improvement by Robert Westervelt, News Director
Marcus Ranum chat: The information security metrics dilemma
by Marcus J. Ranum, Contributor
Security expert Marcus Ranum goes one-on-one with Alex Hutton about the problems with security metric efforts.
Reflections on changing information security trends
by Michael S. Mimoso, Editorial Director
Veteran security journalist reminisces about covering the industry and says farewell to TechTarget.
BYOD policy: The costs and potential ROI
by Andrew Braunberg, Contributor
Security pros need to understand the total costs and potential ROI of BYOD policies.
- Marcus Ranum chat: The information security metrics dilemma by Marcus J. Ranum, Contributor
More Premium Content Accessible For Free
Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...
Not only is modern malware getting more prevalent and sophisticated, it's also now focusing on a broader array of targets. Attackers would still love...
IT Decision Center
Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.