LinuxSecurity Contributor - Benjamin D. Thomas
Benjamin D. Thomas
Articles From Benjamin D. Thomas
1 - 2 min read
Linux receives pat on the back for security
18 April 2005
A recent survey carried out by Evans Data Corporation has revealed that development managers have mo
General Security
1 - 2 min read
Diffie: Infrastructure a disaster in the making
13 April 2005
In the 1970s, Martin Hellman and Whitfield Diffie wrote the recipe for one of today's most widely us
Network Security
1 - 2 min read
Using a Linux failover router
12 April 2005
Today, it's hard to imagine an organization operating without taking advantage of the vast resources
Network Security
1 - 2 min read
Strategic Security
12 April 2005
Christofer Hoff is on a mission. As the director of information security at Western Corporate Federa
General Security
1 - 2 min read
HIPAA Compliance In 30 Days or Less
11 April 2005
HIPAA. We are all sick of the acronym by now, and the April 20 compliance deadline for the Health In
General Security
1 - 2 min read
And here's a key to combat hacking
11 April 2005
As we rely more on computers, the potential for hackers to hurt us and destroy our personal record
Network Security
1 - 2 min read
U.S. government agencies turn to Linux
06 April 2005
As government agencies are being forced to do more with a smaller budget more agencies are turning t
Government
1 - 2 min read
How 20% effort can get you 80% security
05 April 2005
To manage risk, maintain razor-sharp security architecture and still enjoy a peaceful night's sleep,
Wireless Security
1 - 2 min read
Sued for finding security flaws?
04 April 2005
In late March we mentioned that Sybase were making threats against a security company about disclosu
General Security
1 - 2 min read
Hack Job
04 April 2005
When a hacker broke into the network at George Mason University (VA) earlier this year, IT officials
Network Security
1 - 2 min read
Mapping Security: The Corporate Security Sourcebook for Today's Global Economy
30 March 2005
Security in any enterprise should extend beyond just information technology to become an integral pa
Documentation
1 - 2 min read
Learn how to beef up Web application security
30 March 2005
When embracing a defense-in-depth strategy for your organization's systems, setting up a secure netw
Host Security