• The Secret to Effective Remote Access VPN Management

    more

    What we're reading, week of 7/28

    One story has reigned supreme on the blogosphere this week: Dan Kaminksy’s DNS vulnerability discovery, Matasano’s accidental (?) explanation of the details, and the resulting community fallout over…

    What we're reading, week of 7/28

    One story has reigned supreme on the blogosphere this week: Dan Kaminksy’s DNS vulnerability discovery, Matasano’s accidental (?) explanation of the details, and the resulting community fallout over…

    SSL versus IPsec: some considerations

    We asked NCP's Joerg Hirschmann to take look at the arguments presented in Reliable Systems' recent post, "Remote Access for Everyone," and offer some respectful criticism of the case made for SSL…

    Evading the "man in the middle"

    In response to our discussion yesterday about "Man in the Middle Attacks," Rene points us to this article in Wired, which describes how Colombian government forces 'masqueraded' as FARC…

    Evading the "man in the middle"

    In response to our discussion yesterday about "Man in the Middle Attacks," Rene points us to this article in Wired, which describes how Colombian government forces 'masqueraded' as FARC…

    What we're reading, week of 7/21

    We’ve noticed two key issues that have bloggers talking this week:

    What we're reading, week of 7/21

    We’ve noticed two key issues that have bloggers talking this week:

    What we're reading, week of 7/7

    From Reliable Systems…

    What we're reading, week of 7/7

    From Reliable Systems…

    Why Bobbleheads are Better than Corporate Security Checklists

    Recently we've seen some discussion around the blogosphere about corporate security checklists - Kenneth Belva, for one, extols their virtues in a recent post on BlogInfoSec - In Praise of the…