The Devil is in the Microcode

Price, Andrew
December 2011
ITNOW;Dec2011, Vol. 53 Issue 6, p32
Academic Journal
Today's coders are more designing rather than writing real code, says Andrew Rice of HP Information Security.


Related Articles

  • A Trust System Based on Multi Level Virus Detection. Abdul-Amir, Yasmine H. // Journal of Computer Science;2010, Vol. 6 Issue 4, p457 

    Problem statement: As these detection methods were developed and implemented, the virus developers adapted to the new detectors in ways intended to defeat them. Approach: This study introduced new multilevel virus detection (MDS). Results: This system model depended on an advance behavior...

  • Anomaly Intrusion Detection System Using Information Theory, K-NN and KMC Algorithms. Shirazi, Hossein M. // Australian Journal of Basic & Applied Sciences;2009, Vol. 3 Issue 3, p2581 

    The huge expansion in the size of internet and the appearance of various types of malicious attack and the in sufficiency of traditional security tools like antivirus conduct to the development of intrusion detection systems or IDS. Since current IDSs are signature based they still are unable to...

  • Security Awareness - Once is Never Enough.  // Database & Network Journal;Dec2012, Vol. 42 Issue 6, p30 

    The article presents information regarding internet security awareness. It mentions that the workforce should be aware of the importance of internet security especially in healthcare industries. It also presents a seven point action plan for creating awareness amongst the workforce regarding the...

  • Information Security Risks: An Illustrative Example.  // IT Professional;Jul/Aug2008, Vol. 10 Issue 4, p15 

    This article presents an illustrative example of information security risks. The illustrative example illustrates the lesson learned from the study. The study developed the concepts of identifying and protecting the hubs in an information supply chain which are vital steps. The study also shows...

  • Security Patch Management: Share the Burden or Share the Damage? Cavusoglu, Hasan; Cavusoglu, Huseyin; Zhang, Jun // Management Science;Apr2008, Vol. 54 Issue 4, p657 

    Patch management is a crucial component of information security management. An important problem within this context from a vendor's perspective is to determine how to release patches to fix vulnerabilities in its software. From a firm's perspective, the issue is how to update vulnerable systems...

  • Security apps can't weather Storm. Vaas, Lisa // eWeek;11/12/2007, Vol. 24 Issue 35, pE1 

    The article focuses on the usefulness of the Storm botnet. Storm botnet is also known as the storm worm botnet which overpowers most of the anti-virus and the access control systems. The principal security strategist of IBM Internet Security System Joshua Corman states that the storm botnet is...

  • BeCrypt and RSA Join Forces.  // Database & Network Journal;Feb2008, Vol. 38 Issue 1, p26 

    The article reports on BeCrypt's decision to join the RSA Secured Partner Program to certify interoperability between its DISK Protect v4.2 Standard data security solution and the RSA SecurID SID800 hardware token and RSA Smart Card 5200. DISK Protect v4.2 has many additional features such as...

  • Mobile device lockdown. Cummings, Joanne // Network World;3/19/2007, Vol. 24 Issue 11, p40 

    The article provides information on the five fundamental steps needed to guarantee data safety in mobile devices. According to the author, securing company data in needed to protect company's interest, resources and customers' welfare and to avoid any further damages that it may contribute. The...

  • Application Layer Security Issues and Its Solutions. Raghavendra, K.; Nireshwalya, Sumith // International Journal of Computer Science Engineering & Technolo;Jun2012, Vol. 2 Issue 6, p1266 

    Every layer of communication has its own unique security challenges. The application layer communication is a very weak link in terms of security because that the application layer Application Layer security is a growing area of concern for developers, designers, quality assurance specialist and...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics