-
Lesson/Domain 1 -- Security School: Training for CISSP Certification
Lesson 1 of SearchSecurity's Training for CISSP Certification consists of a webcast, article and quiz on security management practices as they apply to (ISC)2's CISSP cert.30 Sep 2004
-
Does Linux really offer improved IT security?
With costs of software flaws exacting a huge toll on organizations, many security experts advocate the use of open-source applications, which they believe are more secure.30 Sep 2004
-
Administrators prove to be spam pragmatists
I think Sender ID will be part of a solution, but what [customers] also need is the notion of reputation.30 Sep 2004
-
HIPAA security compliance not just an IT problem
HIPAA security experts say health organizations are putting too much responsibility in the hands of IT departments.30 Sep 2004
-
Week 41: Your PDA/PED policy
PDAs, part of the larger group of Portable Electronic Devices, can potentially impact security in a variety of ways but are often not part of a security policy.30 Sep 2004
-
Security Bytes: Microsoft sues, cuts a Hotmail free service to slow spam
In other news, new .jpg Trojan detected and New Zealand phone system hacked. U.N. warns of nuclear cyberattacks.29 Sep 2004
-
AV-disabling Bagle variant may take off
A new variant of the Bagle worm that turns off antivirus and personal firewalls is likely to spread rapidly, warn antivirus experts.29 Sep 2004
-
Peril in the wireless world
Despite security improvements, two men who helped shape 802.11i warn wireless networking is still a risky business.29 Sep 2004
-
Best practices for choosing an outside IT auditor
Learn six points for choosing the right outside auditor.29 Sep 2004
-
Five easy ways to lock down IIS 6.0
In this week's tip, Mike Chapple provides five simple actions you can take with IIS 6.0 to make your server more secure.29 Sep 2004
-
'Highly critical' flaws fixed in RealPlayer
An attacker could use multiple vulnerabilities in RealOne Player, RealPlayer and Helix Player to launch malicious code or delete files.29 Sep 2004
-
Making a spectacle out of policy violators
The best medicine for those who violate patient privacy is a pink slip and full press coverage, according to the CIO for several prestigious medical institutions.28 Sep 2004
-
Policy: A critical component of the risk management process
Charles Cresson Wood explains the importance of integrating security policy with business process and establishing an on-going risk management process.28 Sep 2004
-
MBSA: Revisiting an old friend
With the release of a new version of the Microsoft Baseline Security Analyzer, it's a good time to outline the features of this little-known tool, according to a security expert.28 Sep 2004
-
Phishing: A whale of a problem for enterprises
Phishing is no longer just a consumer problem, say experts. The scams are hurting companies' reputations and bottom lines.27 Sep 2004
-
Security Bytes: Flaws in Apache and Sophos SBS
Also included are a fix for a Gentoo Linux hole; and an explanation for a controversial hire27 Sep 2004
-
Authorize.Net says it has 'learned' from attack
The credit card processing service was unprepared for the kind of attack it suffered last week, but it will use the experience to improve security.27 Sep 2004
-
Math phobia
Reports of breakthroughs that may endanger encryption security are widespread, but how practical are these mathematical solutions?27 Sep 2004
-
How much time does it take to prepare for the CISSP?
24 Sep 2004
-
Multiple strategies guard youth services agency
Case study: How to protect confidential information, ward off spam and malware, and defend against intrusions with a smaller budget.24 Sep 2004
Security Management Strategies for the CIO