-
Experts lay out inexpensive patching strategies
Smaller organizations with limited IT budgets may not be able to afford expensive, automated patching systems. But they don't have to settle for hole-ridden desktops and servers either.30 Nov 2004
-
Security Bytes: SCO attacked … again
Also, MailEnable and Gentoo fix flaws; active phishing attacks double.30 Nov 2004
-
Microsoft hit by one-two punch
Microsoft offers workarounds for the Windows Internet Name Service vulnerability. Meanwhile, another IE security hole has been reported.30 Nov 2004
-
Patch Tuesday linked to exploit time frame
VeriSign report shows Microsoft's patch releases coincide with new exploits with such regularity they can almost be plotted on a calendar.29 Nov 2004
-
New Year's resolution: Select alternative hardware and software
Monoculture continues to pose its share of security threats. Periodically take the opportunity to evaluate applications and hardware.29 Nov 2004
-
Some concepts don't need proving
Proofs of concept help no one but attackers.29 Nov 2004
-
Lesson/Domain 5 -- Security School: Training for CISSP Certification
Security School webcasts are focused on CISSP training. This lesson corresponds to the telecommunications and networking domain in the CISSP exam's "Common Body of Knowledge."24 Nov 2004
-
Security Bytes: Eudora's new approach to phish scams; CA World postponed
In other news, judge dismisses case against keylogging whistleblower.24 Nov 2004
-
Growing demand for command-control services
Compliance concerns have a growing number of enterprises turning to firms that provide command and control, according to a Yankee Group survey.24 Nov 2004
-
Enterprises have a role in fighting ID theft
Experts say enterprises must avoid being used as pawns in identity theft schemes. A new survey shows customers support companies that take strong steps to protect them.23 Nov 2004
-
XML complexity introduces security risks
While XML security threats may still be theoretical, XML authentication and the complexity of performance issues need to be addressed now.23 Nov 2004
-
Security Bytes: Hole in Winamp; Java Plug-in flaw fixed
In other news, a vulnerability is found in Opera, while new malicious code targets mobile phones and Asian pop star fans.23 Nov 2004
-
How to select the best security assessment tool for the job
Here are four factors to take into account when choosing a security assessment tool.22 Nov 2004
-
Here, kiddie kiddie
Exploiting vulnerabilities and capitalizing on configuration errors are the only ways a computer system can be hacked.22 Nov 2004
-
Infected ad banners exploit IE's IFRAME flaw
Experts recommend IE users switch to another browser or disable Active Scripting to guard against infected ad banners exploiting the IFRAME vulnerability.22 Nov 2004
-
Welded shut: How to patch vulnerabilities and keep them sealed
Time is the enemy of every security manager charged with patching, implementing the right process can simplify the challenge22 Nov 2004
-
Report: Security incidents dip, threat remains
VeriSign's internet security report notes exploits, attacks mirror Microsoft patch releases.22 Nov 2004
-
Some 'Sober' on new worm variant
The latest incarnation appears to have legs and a high threat rating from some AV vendors.19 Nov 2004
-
Week 48: SANS Top 20
Knowing and then keeping current on the volume of security information required to manage security is a serious challenge.19 Nov 2004
-
Bright ideas
Check out some bright ideas from the Fall 2004 Information Security Decisions show.19 Nov 2004
Security Management Strategies for the CIO