-
April countdown: Best of SearchSecurity.com
Our most popular exclusives from April 2004.30 Apr 2004
-
New variants of the prolific Bagle and Netsky families get legs
New Bagle worm gains traction in the U.S., while new Netsky proliferates in Asia and Europe.29 Apr 2004
-
Schmidt contemplates run for Congress
eBay CISO Howard Schmidt is considering a run for Congress. But is a security background a vote-clincher?29 Apr 2004
-
Malware: Bombs away
Compression formats, such as the popular .zip, are the bane of the antivirus industry, as unsuspecting users unleash worm after worm hidden within compressed files. Now, they pose another threat.29 Apr 2004
-
Week 20: Beginning the dreaded risk assessment
In this week's column, Shelley Bard offers tips on how to perform a risk assessment.29 Apr 2004
-
Information Security Protection Matrix
Information Security has four tenets designed to ensure the total integrity of a system: Confidentiality and integrity of data, availability of service, and accountability (CIA2).28 Apr 2004
-
Return to sender?
Researchers have found a new e-mail attack that can swamp servers, including secondary systems.28 Apr 2004
-
SQL Server user-security checklist
Here are a few quick steps to assess the security of user accounts/permissions on your SQL Server.28 Apr 2004
-
Industry Notebook: Network Associates says 'smell ya later' to Sniffer
Network Associates sells its Sniffer Technologies unit and decides to call itself McAfee.27 Apr 2004
-
April alerts arrive in record numbers
IT managers swimming in security alerts nearly drowned in April.27 Apr 2004
-
Information Security Decisions Spring 2004: Speaker presentations
View the speaker presentations from Information Security Decisions Spring 2004.27 Apr 2004
-
Tier-1 policy overview: Corporate communications, work place security
In this third installment of a four-part series on tier-1 policies, you will learn about corporate communications, work place security.27 Apr 2004
-
Safe computing in public hot spots
What precautions to take if you are going to utilize wireless hot spots.27 Apr 2004
-
Experts say malicious hackers growing in numbers
Security managers often find it frustrating that the development of threats always seems to be a step ahead of protective measures.26 Apr 2004
-
Can your fingerprint be compromised?
Biometric systems are presumed to be a strong form of security because they authenticate users through fingerprints, retinal patterns and other unique physical characteristics. But, what happens if...26 Apr 2004
-
What's the best way to get started in information security?
26 Apr 2004
-
Should I choose a Lotus Notes or infosec career path?
26 Apr 2004
-
Is it a good idea for the firewall OS to initiate automated updates?
26 Apr 2004
-
Has your opinion changed regarding the Certification in Homeland Security?
26 Apr 2004
-
Should I specialize in Check Point Firewall-1 security?
26 Apr 2004
Security Management Strategies for the CIO