-
Thwarting the ultimate inside job: Malware introduced in the software development process
Ed Skoudis offers tips for securing the software development process.31 Mar 2004
-
The inherent capabilities of IPsec selectors and their use in remote-access VPNs
Network security expert Lisa Phifer explains the inherent capabilities of IPsec selectors versus how they're commonly used for remote-access VPNs.31 Mar 2004
-
SSL VPNs and client-application authentication
Network security expert Lisa Phifer addresses the impact of SSL VPNs on client-application authentication.31 Mar 2004
-
Opening unknown e-mail attachments labeled a security sin
A new poll reveals almost half of IT managers surveyed believe opening an unknown attachment is the most serious security offense their users can commit.31 Mar 2004
-
March 2004: The best of SearchSecurity.com
Peruse our top 10 articles and tips for the month of March.31 Mar 2004
-
Netsky-Q stands out in the pack; R surfaces
Two new Netsky variants prove troublesome to administrators trying to shield networks from current worm wars.31 Mar 2004
-
Managing change in information security policies
In this tip, security expert Mike Chapple will highlight a five-step process designed to help your organization approach necessary changes to its IT security policies in a formal, yet flexible fash...30 Mar 2004
-
Authentication and access
This tip describes levels of authentication and various access methods.30 Mar 2004
-
SCADA security hearing begins today
A Congressional hearing examines insecurities in the networks of our nation's most critical -- and vulnerable -- systems.30 Mar 2004
-
Authentication and access
This tip describes levels of authentication and various access methods.30 Mar 2004
-
Young SAML must conquer business pressures
Security Assertion Markup Language is technologically sound, says a Burton Group analyst. Adoption now hinges on business decisions.29 Mar 2004
-
Episode III: Enforcing threat prevention rules and regulations
In response to great pressure to comply with the canons thrown down by Regulatius, the King draws up strict regulations.29 Mar 2004
-
Pink slips motivate policy compliance
Public executions are necessary for ensuring security policy compliance, says Dr. John Halamka, CIO of both Boston's Beth Israel Deaconess Medical Center and Harvard Medical School.29 Mar 2004
-
Latest Bagle variants make game of 'Hearts'
Bagle now likes the "Hearts" online card game. Care for some Solitaire?29 Mar 2004
-
Software Forensics: Chapter 2 -- The Players: Hackers, Crackers, Phreaks, and Other Doodz
This chapter examines the players involved in software forensics.29 Mar 2004
-
OPINION: Will Microsoft ever get its act together?
Checking out Microsoft advisories reveals Microsoft revamped its security bulletins, as published in the security section of its TechNet Web site, causing security concerns.29 Mar 2004
-
Can you recommend RC4 128-bit encrypted software?
29 Mar 2004
-
Intrusion Detection & Prevention: Chapter 17 -- The Future of Intrusion Detection and Prevention
This excerpt talks about the future of intrusion detection and prevention.29 Mar 2004
-
The future of intrusion detection and prevention
Read Chapter 17, The Future of Intrusion Detection and Prevention, from the book "Intrusion Detection & Prevention" written by Carl Endorf, Eugene Schultz, Ph.D., and Jim Mellander.29 Mar 2004
-
Week 15: Spring cleaning: Part 1 -- Accounts and space
It's spring and time for spring cleaning. The less there is on your system the less there is to go wrong and to fix when something happens.25 Mar 2004
Security Management Strategies for the CIO