October 2005 | Archive by Month | SearchSecurity.com | Page 3

October 2005

  • Creating a corporate security culture

    Learn how to successfully consolidate, integrate and centralize your security practices, as well as set in motion a security governance process that defines your company's security vision and strat...

  • The future of security: Where are we going?

    This presentation by Bill Hancock will help you to keep pace with the evolving landscape of threats, increasing challenges of compliance and ongoing imperative of calculating risk.

  • A guide to governance, security and safeguarding your business

    In this presentation, Dr. Fred Cohen, who is one of the world's leading researchers and analysts in information protection, investigates the link between corporate governance and information protec...

  • High-risk flaws in Skype

    Attackers could cause a denial-of-service attack or launch malicious code by exploiting vulnerabilities in the Internet telephony software. But fixes are available.

  • Group seeks to bolster VoIP security

    An industry coalition has published a lengthy list of guidelines to help identify and deal with threats against Internet voice communications systems.

  • How to build a secure network from the ground up

    Receive peer advice on what steps are crucial when building a secure network from the ground up. Also learn what resources are available to guide you through this process.

  • Windows Plug and Play has a new enemy

    Mocbot targets an already-exploited security hole Microsoft patched in August. Could it be the next Zotob?

  • Microsoft antispyware: Dominant or destructive?

    Microsoft's free antipsyware product may be a tempting option, but can security wait two or more years until Redmond gets it enterprise-ready?

  • Admins grapple with latest Oracle patch puzzle

    As database administrators digest Oracle's supersize patch release, security experts warn of unfixed flaws and at least one exploit.

  • Reporter's Notebook: NYC 'controls the software industry'

    At Information Security Decisions: a security "rock star" rages against the Microsoft machine; banging the drum for enterprise security; a sour note on zero-day exploits.

  • Patch deployment timeline

    In this Ask the Expert Q&A, our platform security expert discusses how long a mid- to large company should expect to wait before they are able to deploy a patch.

  • The future of Telnet and FTP

    In this Ask the Expert Q&A, our application security expert discusses what he believes what will happen to the Telnet and FTP application layer protocols as the industry prepares for the future.

  • How to develop an effective application security strategy

    In this Ask the Expert Q&A, our application security expert discusses tools and tactics to consider when developing a secure and effective application security strategy.

  • Using OS Security's OSsurance

    In this Ask the Expert Q&A, our application security expert takes an in-depth look at OS Security's OSsurance tool and discusses how it can help protect against a variety of application-based attacks.

  • The pros and cons of reformatting a hard drive

    In this Ask the Expert Q&A, our platform security expert discusses the pros and cons of reformatting a hard drive after an attack.

  • How to remove TrueActive software from your system

    In this Ask the Expert Q&A, our application security expert reviews the strengths and weaknesses of TrueActive, a commercially available keylogging tool. He also discusses what methods you should t...

  • 'InfoSec Career Hacking' states obvious, but good for newbies

    Review of InfoSec Career Hacking: Sell Your Skillz, Not Your Soul, a book for security geeks about landing a corporate IT security job.

  • Author delves into novel attack methodologies

    Review of Silence on the Wire, a book about security attack methodologies such as passive fingerprinting.

  • Elements of a data protection strategy

    In this excerpt from Data Protection and Lifecycle Management, Tom Petrocelli addresses the importance of securing data for regulatory compliance and outlines the five components of a data protecti...

  • Competing regulations clog road to compliance

    It's difficult for most organizations to cope with today's multitude of compliance regulations, but an expert at Information Security Decisions said security frameworks may be the answer.