Articles on Spyware
When It Comes To Anti-Spyware Tools, Accuracy Is Key
Blocking Spyware at the Network Gateway - The Security Skeptic
The Top 5 Enterprise Antispyware Requirements - The Security Skeptic
Spyware: Your Worst Nightmare
Antispyware and Antivirus software ought to be the sameware
What's The Difference Between Spyware And Viruses?
Legislation Won't Stop the Spyware Juggernaut
How to Keep Spyware Off our Enterprise Network
Ethical Hacking Redux
Ethical Hacking could be so much more than an oxymoron
Security Hats: Black and White, No Grayscale
Articles on Domain Names
Trust and the Future of the Internet
How To Protect Yourself Against Domain Name Hijackers
The Cyber Doomsday Machine (Part 2)
The Cyber Doomsday Machine
DNS Cache Poisoning
Redirection and synthesized DNS responses do more harm than good
A Case for Identity Management
Improve Your Branch Office Security One A at a Time
Web Application Code is Part of Your Security Perimeter
Application Protection: Where is it best applied?
Take Stock of Endpoint and Admission Control Now
Endpoint security and admission control: necessary but not sufficient
IDS and DDOS Protection - Better Days Ahead
Firewall Best Practices - Egress Traffic Filtering
The re-emergence of SSL VPNs
Phishing: a low-paid, low-skills enterprise?
E-crime facts, figures, frustrations, and fixes
Care and Handling of Credit and Personal Information
What is a blended threat?
Contact me @