Threat Agent
Friday, February 12, 2010
Stop clicking
›
I know this isn’t sexy cutting edge security stuff and it’s super basic to most some of you out there. However, the most common path for...
1 comment:
Texas Lycium and Cyber Security
›
I attended an event at the Majestic Theater in downtown San Antonio last Friday night with the subject: "Our Growing Lives Online: Safe...
22 comments:
Friday, February 5, 2010
Cybersecurity Enhancement Act of 2009 Passes the House 422-5
›
Over the next four years, each American will pay 75 cents per year to fund projects that will require more extensive data security standards...
3 comments:
NASA still struggling with IT Security
›
Some time ago, I snarkely stated that InfoSec is not rocket science. Apparently it's much harder than that. According to the GOA direct...
2 comments:
Tuesday, February 2, 2010
WPA vs WPA2 - Worth the upgrade?
›
BLUF: WPA (Wi-Fi Protected Access) only supports TKIP (Temporal Key Integrity Protocol) which has been weakened a couple of times. It is exp...
1 comment:
Home
View web version