-
What is the future of computer forensics?
30 Sep 2003
-
Quick Takes: Trend Micro supports Domino 6.5
Content security vendor Trend Micro announced support for Domino 6.5, leading off this edition of Quick Takes. Also included are items from TruLogica, Executive Software, Sygate Technologies and Ac...30 Sep 2003
-
September 2003: The best of SearchSecurity.com
The top 10 news articles and tips on SearchSecurity.com in September 2003.30 Sep 2003
-
PwC survey: Regulation driving security, C-level union
Regulation is bringing enterprise executives and security officers closer, according to a recent PricewaterhouseCoopers survey.30 Sep 2003
-
Security starts at the beginning
Tips for integrating security in the application development lifecycle.29 Sep 2003
-
'Rain Doll' They called it 'Rain Doll!'
The mystery behind the newest encryption algorithm explained.29 Sep 2003
-
SQL Server Security: Chapter 2, Under Siege: How SQL Server is Hacked
This excerpt is from Chapter 2, Under Siege: How SQL Server is Hacked from SQL Server Security by David Litchfield.29 Sep 2003
-
Practical biometrics
A look at the different flavors of biometrics and how they are becoming more common as a physical security precaution.29 Sep 2003
-
Biometrics may be too pricey, complex for data center
Data center managers and experts say that biometric devices need to come down in cost, and that integration difficulties have to disappear before those tools come to represent a preferred authentic...29 Sep 2003
-
IDC: Security spending passes overall IT spending
What are IT managers spending their precious budget dollars on? IDC says it's security and business continuity.29 Sep 2003
-
@stake luminary fired for controversial paper
Consultancy @stake fired its CTO, noted security researcher, Dan Geer last week for his participation in a research paper critical of Microsoft's dominance in computer networks, and the security im...29 Sep 2003
-
One-time pads explained
29 Sep 2003
-
Sarbanes-Oxley issues rattle executives
The Sarbanes-Oxley Act has sent executives scrambling to ensure accounting accuracy and compliance. Find out more about what has executives worried.26 Sep 2003
-
Coalition to help enterprises manage identities against theft
The Coalition on Online Identity Theft, made up of e-businesses, IT vendors and others, aims to ensure that enterprises protect customer identities from theft and maintain proper security controls.25 Sep 2003
-
Are P2P applications worth the risk?
There are inherent security dangers in P2P applications. Kevin Beaver helps you determine if they're worth the risk.24 Sep 2003
-
Experts say Microsoft monopoly poses national security risk
Calling for increased biodiversity in IT infrastructures, a group of infosecurity luminaries warns that Microsoft's dominance is threatening U.S. security.24 Sep 2003
-
Government flexes its spending muscle with 'model contract'
The Department of Energy is the first federal agency to act on a "model contract" that demands vendors deliver software that is securely configured.24 Sep 2003
-
Quick Takes: XML firewall integrates crypto hardware
Reactivity Inc., announced that it has integrated cryptographic hardware from nCipher into its XML Firewall product, leading off this edition of Quick Takes. Also included are items from OpenServic...23 Sep 2003
-
Removing backdoor.sdbot from computers
23 Sep 2003
-
Cost savings, security through identity management
Identity management is a fairly ambiguous term used to describe a variety of technologies. SearchSecurity.com recently sat down with Chris Pick, vice president of market strategy for NetIQ Corp., t...22 Sep 2003
Security Management Strategies for the CIO