October 2005

  • Special Report: In the Eye of the Beholder

    In our latest special report, "In the Eye of the Beholder," we take responses to our September reader survey and tell the spyware story from your perspective, letting security pros in the trenches ...

  • The 5 pillars of successful compliance

    Find out how to put the key benefits of what Pamela Fusco achieved at Merck & Co. to work in your own organization as she covers five key areas associated with security's role in compliance.

  • Smart options for safeguarding stored data

    Learn the three basic ways to encrypt sensitive data: encryption at the source, encryption with a backup application and hardware encryption, as well as the advantages and disadvantages of each opt...

  • Future watch -- Hot security technologies and emerging trends in 2006

    This presentation helps you understand the evolution of the security vendor landscape with an eye toward promising security techniques and technologies for 2006.

  • Creating a corporate security culture

    Learn how to successfully consolidate, integrate and centralize your security practices, as well as set in motion a security governance process that defines your company's security vision and strat...

  • A guide to governance, security and safeguarding your business

    In this presentation, Dr. Fred Cohen, who is one of the world's leading researchers and analysts in information protection, investigates the link between corporate governance and information protec...

  • The future of security: Where are we going?

    This presentation by Bill Hancock will help you to keep pace with the evolving landscape of threats, increasing challenges of compliance and ongoing imperative of calculating risk.

  • High-risk flaws in Skype

    Attackers could cause a denial-of-service attack or launch malicious code by exploiting vulnerabilities in the Internet telephony software. But fixes are available.

  • Group seeks to bolster VoIP security

    An industry coalition has published a lengthy list of guidelines to help identify and deal with threats against Internet voice communications systems.

  • Windows Plug and Play has a new enemy

    Mocbot targets an already-exploited security hole Microsoft patched in August. Could it be the next Zotob?

  • How to build a secure network from the ground up

    Receive peer advice on what steps are crucial when building a secure network from the ground up. Also learn what resources are available to guide you through this process.

  • Microsoft antispyware: Dominant or destructive?

    Microsoft's free antipsyware product may be a tempting option, but can security wait two or more years until Redmond gets it enterprise-ready?

  • Admins grapple with latest Oracle patch puzzle

    As database administrators digest Oracle's supersize patch release, security experts warn of unfixed flaws and at least one exploit.

  • Reporter's Notebook: NYC 'controls the software industry'

    At Information Security Decisions: a security "rock star" rages against the Microsoft machine; banging the drum for enterprise security; a sour note on zero-day exploits.

  • How to remove TrueActive software from your system

    In this Ask the Expert Q&A, our application security expert reviews the strengths and weaknesses of TrueActive, a commercially available keylogging tool. He also discusses what methods you should t...

  • Patch deployment timeline

    In this Ask the Expert Q&A, our platform security expert discusses how long a mid- to large company should expect to wait before they are able to deploy a patch.

  • Using OS Security's OSsurance

    In this Ask the Expert Q&A, our application security expert takes an in-depth look at OS Security's OSsurance tool and discusses how it can help protect against a variety of application-based attacks.

  • The pros and cons of reformatting a hard drive

    In this Ask the Expert Q&A, our platform security expert discusses the pros and cons of reformatting a hard drive after an attack.

  • The future of Telnet and FTP

    In this Ask the Expert Q&A, our application security expert discusses what he believes what will happen to the Telnet and FTP application layer protocols as the industry prepares for the future.

  • How to develop an effective application security strategy

    In this Ask the Expert Q&A, our application security expert discusses tools and tactics to consider when developing a secure and effective application security strategy.