Deb Radcliff

Most Recent Articles by Deb Radcliff

Cyber beacons: The challenges of new technologies

Cyber beacons: The challenges of new technologies

Organizations are working overtime to design ways to control, via policy and technology, employees' penchant for sharing private information across social networking and mobile devices.

Safe development: Safeguarding web applications

Safe development: Safeguarding web applications

Age-old vulnerabilities, like SQL injection and cross-site scripting, remain prevalent in applications. And that trend will continue, unless there is a fundamental shift in how programs are developed and secured.

Breaking the next case

Breaking the next case

Today's flurry of cybercrimes rely on an array of motivations, techniques and technologies, making the job of an investigator to track down the offender that much more difficult.

Federation 2.0: An identity ecosystem

Federation 2.0: An identity ecosystem

Federated identity, the process of authenticating someone across multiple IT systems and organizations, is taking on new meaning with the growth of cloud and mobile.

Safety in the cloud: Cloud-based services

Safety in the cloud: Cloud-based services

With more organizations hesitant to entrust their sensitive data to the cloud and a handful of high-profile breaches, providers are augmenting their protections capabilities.

More Articles by Deb Radcliff

Nurturing CSO careers

Cloud shift

Global village

Is DRM Dead or alive?

Sign up to our newsletters

POLL