News & Events

News in category "Published Articles"

,

SearchSecurity – Securing SharePoint: SharePoint security best practices

SearchSecurity – Securing SharePoint: SharePoint security best practices Microsoft’s SharePoint application has become a ubiquitous collaboration tool in the enterprise but securing it can be a tricky process. And all too often, companies fail to properly secure their SharePoint deployments, security experts say. In fact, a survey of SharePoint users released earlier this year …

,

SPI Dynamics Expert Articles Series – Implementing Effective Vulnerability Remediation Strategies Within the Web Application Development Lifecycle – Aug2007

Vincent Liu co-authors Implementing Effective Vulnerability Remediation Strategies Within the Web Application Development Lifecycle as part of the SPI Dynamics Expert Articles series. Once you’ve completed a security assessment as a part of your web application development, it’s time to go down the path of remediating all of the security problems you uncovered. At …

,

SPI Dynamics Expert Articles Series – Web Application Vulnerability Assessment Essentials: Your First Step to a Highly Secure Web Site – Aug2007

Vincent Liu co-authors Web Application Vulnerability Assessment Essentials: Your First Step to a Highly Secure Web Site as part of the SPI Dynamics Expert Articles series. If an organization isn’t taking a systematic and proactive approach to web security, and to running a web application vulnerability assessment in particular, then that organization isn’t defended against …

,

ISSA Journal – July 2007 – Penetration Testing: The White Hat Hacker

Vincent Liu authors Penetration Testing: The White Hat Hacker in the July 2007 issue of the ISSA Journal. Most people attempt to define penetration testing as a network attack against an Internet DMZ with the goal of breaking into the internal network. Fundamentally, however, penetration testing is properly defined as the simulation of an …

,

CIO Magazine – How Online Criminals Make Themselves Tough to Find, Near Impossible to Nab – May 2007

Vincent Liu will be featured in CIO Magazine – How Online Criminals Make Themselves Tough to Find, Near Impossible to Nab. Forensic investigations start at the end. Think of it: You wouldn’t start using science and technology to establish facts (that’s the dictionary definition of forensics) unless you had some reason to establish facts …

,

The Business Journal of Phoenix – Even without big budget, employee theft can be stopped – Nov 2006

Vincent Liu will be providing expertise on protecting corporate assets in the November 24, 2006 issue article, The Business Journal of Phoenix – Even without big budget, employee theft can be stopped. Ever wonder where your profits are going? The U.S. Chamber of Commerce estimates that theft by employees costs American companies $20 billion to …

,

Journal of Digital Forensic Practice – Challenging the Presumption of Reliability – Mar2006

Vincent Liu authors Digital Evidence: Challenging the Presumption of Reliability in the 2006-Volume 1 issue of the Journal of Digital Forensic Practice. There is a general tendency among courts to presume that forensic software reliably yields accurate digital evidence. As a judicial construct, this presumption is unjustified in that it is not tailored …