-
First steps in locking down Windows Server 2003
Some thoughts on securing the new operating system.30 Jun 2003
-
10 Common questions (and answers) on WLAN security
Networking guru Lisa Phifer answers ten commonly asked questions about securing wireless LANs.30 Jun 2003
-
California screaming: Companies must disclose security breaches
California's Security Breach Information Act (SB 1386) becomes official Tuesday.30 Jun 2003
-
The security policy document library: E-mail policy
A look at the e-mail portion of an organization's security policy documents.30 Jun 2003
-
Did Sobig-E have a secret mission?
Experts analyzing the Sobig-E worm contemplate whether the author is a spammer and whether using Zip files to distribute the worm could set the stage for similar future attacks.27 Jun 2003
-
Sobig-E introduces new means of attack
The fifth variant of the Sobig worm spreads as a Zip file, a means of attack that could sidestep many virus scanners, experts say.26 Jun 2003
-
New Sobig variant spreading rapidly
The spread of the Sobig-E worm has increased rapidly this morning, leading most antivirus vendors to elevate it to a high risk.26 Jun 2003
-
Who's Who in Infosec: Ronald Rivest
Who's Who in Infosec is an ongoing series featuring profiles of security professionals and their contributions to the industry.26 Jun 2003
-
Secure IIS/Enterprise Web Protector safeguards your Web server
David Strom takes a closer look at Eeye Digital Security's Secure IIS/Enterprise Web Protector.25 Jun 2003
-
Stumbler mapping networks for future attacks
A recently discovered network-mapping tool is probing networks for open ports on firewalls and hosts, possibly setting the stage for a future attack, researchers said.25 Jun 2003
-
Who's Who in Infosec: Philip Zimmermann
Who's Who in Infosec is an ongoing series featuring profiles of security professionals and their contributions to the industry.25 Jun 2003
-
Who's Who in Infosec: William Hugh Murray
Who's Who in Infosec is an ongoing series featuring profiles of security professionals and their contributions to the industry.25 Jun 2003
-
Who's Who in Infosec: Dorothy Denning
Who's Who in Infosec is an ongoing series featuring profiles of security professionals and their contributions to the industry.25 Jun 2003
-
Why Bugbear-B is bypassing my company's gateways
25 Jun 2003
-
Upgrading to Wi-Fi protected access
Learn about upgrading Wi-Fi protected access.24 Jun 2003
-
How secure is NT authentication?
24 Jun 2003
-
Quick Takes: IPS appliance examines, filters network traffic
TippingPoint's new intrusion prevention appliance UnityOne200 is generally available and leads off this week's edition of Quick Takes.24 Jun 2003
-
Who's Who in Infosec: Ira Winkler
Who's Who in Infosec is an ongoing series featuring profiles of security professionals and their contributions to the industry.24 Jun 2003
-
The Security Frontier
Read chapter one of Defending the Digital Frontier.24 Jun 2003
-
Experts: Plan for wireless before rogue access points appear
Wireless technology is convenient and inexpensive, a potentially troubling combination for administrators, given that wireless technology is prone to security problems.24 Jun 2003
Security Management Strategies for the CIO