What is Defense in Depth

Defense-in-depth is fundamental to the design of a secure system. It stems from the idea that software can have flaws; people can make configuration mistakes; and hardware devices can fail. To compensate for events like these, we do not want to rely on a single mechanism to defend our resources. Instead, we deploy multiple layers […]

Continue Reading

Computer Security Tips and Best Practices

Protecting yourself is very challenging in the hostile environment of the internet. Imagine a global environment where an unscrupulous person from the other side of the planet can probe your computer for weaknesses, and exploit them to gain access to your most sensitive secrets. They can even use your computer to store data like stolen […]

Continue Reading

Most Influential People in Security

Ryan Naraine over at eweek.com has come up with an interesting list of the top 15 most influential people in Computer Security. 1. Tavis Ormandy, Google Security Team’ 2. Ivan Krstic, One Laptop Per Child’ 3. Chris Paget, IOActive’ , Google 4. Bunnie Huang, Bunnie Studios’ 5. Michal Zalewski, Google’ 6. Window Snyder, Mozilla 7. […]

Continue Reading