Search For:

Displaying 1-4 out of 4 total
Does Security Trump Reliability?
Found in: Computer
By James Bret Michael,Phillip A. Laplante,Jeffery Payne,Paul E. Black,Jeffrey M. Voas
Issue Date:November 2013
pp. 84-86
A conference panel discussed security and reliability and which of these concerns outweighs the other. Although the panel didn't conclude that one is definitively more important than the other, it did open the discussion for further consideration.
 
System Event Monitoring for Active Authentication
Found in: IT Professional
By Jeffery Payne,Mark Fenner,Jonathan Kauffman
Issue Date:July 2013
pp. 34-37
The authors use system event monitoring to distinguish between the behavioral characteristics of normal and anomalous computer system users. Identifying anomalous behavior at the system event level diminishes privacy concerns and supports the identificatio...
 
Integrating Application Security into Software Development
Found in: IT Professional
By Jeffery Payne
Issue Date:March 2010
pp. 6-9
<p>It's difficult to transition application security initiatives from identifying vulnerabilities after software has been produced to proactively mitigating vulnerabilities during the entire software development process. Learn about a simple approach...
 
Secure Mobile Application Development
Found in: IT Professional
By Jeffery Payne
Issue Date:May 2013
pp. 6-9
The author reviews how and why threat models differ between mobile applications and traditional Web applications and discusses a few of the best practices associated with secure mobile development.
 
 1