-
Another vulnerability found in Sendmail
A serious buffer-overflow vulnerability in Sendmail, one of the most popular mail transfer agents, has been discovered.31 Mar 2003
-
Policy for the real world: Physical security
A look at a security policy for the real world.31 Mar 2003
-
PHI in the subject line of e-mail
29 Mar 2003
-
Equivalent of MD5 for Windows 2000
29 Mar 2003
-
What is Web-based malicious mobile code?
29 Mar 2003
-
Researcher chews fat on spam and security
Spam is one of the hottest IT issues. Who hasn't received e-mail solicitations for Viagra and mortgage-reduction plans? A new research group under the Internet Engineering Task Force (IETF) is work...28 Mar 2003
-
Don't dismiss possibility of malicious code on Linux
As Linux rises in popularity on the desktop and enterprise servers, virus and worm writers will start to pay more attention to exploiting holes in open-source.27 Mar 2003
-
Welcome to SearchSecurity.com's new look
Introducing SearchSecurity.com's new look.27 Mar 2003
-
SAN approaches to LUN security
In a well-managed SAN, users should be aware only of those files to which they have access.26 Mar 2003
-
Security for the virtual enterprise
When everything's "outside," how do you secure the "inside"?26 Mar 2003
-
Best principles for storage security
From a business perspective, storage security should be evaluated as any other technology.26 Mar 2003
-
Save your SAN: Secure your LAN
One of the biggest vulnerabilities in SAN security isn't in the SAN at all. It's in the enterprise LAN.26 Mar 2003
-
Storage security: Enforcing policies and procedures that work
Improve your data security with these policy tips.26 Mar 2003
-
Winkler-Mitnick rematch set for RSA Conference
Hewlett-Packard chief security strategist Ira Winkler and convicted computer criminal Kevin Mitnick are part of a panel at this year's RSA Conference that will examine the pros and cons of hiring a...26 Mar 2003
-
RSA agenda reflects security concerns of IT pros
RSA Conference 2003, the largest annual IT security conference, begins April 13 in San Francisco, with expanded hacker and threat tracks, a keynote from former Clinton administration national secur...26 Mar 2003
-
The five A's of functional SAN security
Keeping a SAN secure is complex because SANs are complex.26 Mar 2003
-
Quick Takes: US Army signs on smart card provider
ActivCard announced it will provide nine million smart cards for the U.S. Army's Common Access Card program, kicking off this edition of Quick Takes.25 Mar 2003
-
Multiple Windows 2000 WebDAV exploits made public
As many as five different pieces of exploit code for recently announced vulnerabilities in Windows 2000 have been made public on security mailing lists.25 Mar 2003
-
Invalidate LANMan
This tip offers two suggestions for securing Windows LANManager.25 Mar 2003
-
Protect Active Directory traffic with a VPN
Active Directory network traffic is mission critical and highly sensitive, and must be protected by a VPN.24 Mar 2003
Security Management Strategies for the CIO