-
A feasible plan for a central virus-naming body
A SearchSecurity.com member offers his ideas on creating a virus-naming body.30 May 2003
-
Webcasts: Advice for the security certs path
Let's face it when it comes to choosing a security certification the path is not always clear cut. How do you decide which cert is right for you? Do you really "need" a particular security cert? Ar...29 May 2003
-
Microsoft finds familiar WebDAV flaw in NT, XP
A security vulnerability first found in a core Windows 2000 component has been discovered in NT 4.0 and XP as well, Microsoft said Wednesday in an advisory.29 May 2003
-
Deciding on the certification that will pay more money -- the CCSP or CCNP?
28 May 2003
-
Quick Takes: Tool identifies network vulnerabilities
Qualys announced a Web-based tool that identifies network vulnerabilities, leading off this edition of Quick Takes.28 May 2003
-
Do public schools that store student info need to comply with HIPAA?
28 May 2003
-
Survey: Most workers must remember six passwords or more
A recent SearchSecurity.com poll found that nearly 80% of respondents have to remember six or more passwords to do their jobs.27 May 2003
-
Biometrics hot topic on Capitol Hill
A Frost & Sullivan analyst says that the biometrics industry is targeting the government for widespread adoption of biometrics tools, in particular since September 11.27 May 2003
-
May 2003: The Month in Review on SearchSecurity.com
After several quiet months on the malware front, May brought us Fizzer, Palyh and new LovGate variants. The SearchSecurity.com Editorial Team provides you with in-depth coverage of each, as well as...26 May 2003
-
Which key is which?
A look at the differences between symmetric and asymmetric keys.23 May 2003
-
The security implications of using IM through a dedicated port
23 May 2003
-
What can you tell me about the Computer Forensic Online Training course?
23 May 2003
-
Former cybersecurity czar suggests patch clearinghouse
Former cybersecurity advisor Richard Clarke said this week that an independent group should be established that would test patches against common enterprise applications.22 May 2003
-
News Spotlight: Expert insight on Fizzer, Palyh
Get a sneak peek at the level of insight you'll receive next week when we speak with Snort developer Marty Roesch during the SearchSecurity News Spotlight. This week, analyst Robert Lonadier and Se...21 May 2003
-
New foundation to promote standards for security pros
Two organizations for security professionals have created a foundation that will promote careers and standards.21 May 2003
-
Join SearchSecurity.com and read chapter 4 from Hacking Exposed
Activate your FREE membership today and gain access to chapter downloads, security news, white papers, webcasts and more!21 May 2003
-
Time to stop inventing virus wheels
SearchSecurity.com expert Robert Vibert offers an alternative to our current approach to viruses.21 May 2003
-
Why can't I just use SSL to protect my Web services?
20 May 2003
-
Quick Takes: Antivirus prices tumble for SMBs
Trend Micro has reduced prices on its antivirus security suites for small and medium sized businesses, leading off this edition of Quick Takes.20 May 2003
-
Spoofing ability gives Palyh worm some legs
The latest Internet worm, Palyh, pretends to be a support message from Microsoft. This spoofing ability has allowed the worm to spread like wildfire this week.20 May 2003
Security Management Strategies for the CIO