December 2005 | Archive by Month | | Page 6

December 2005

  • Application Security: Cenzic's Hailstorm v2.6

    Cenzic's Hailstorm v2.6

  • Be afraid of the catastrophic data breach

    Though stories on the latest data breaches seem to pass through the headlines in the blink of an eye, experts warn that the loss or exposure of customer data can have long-lasting consequences. In ...

  • On the Mend

    Health care giant Novartis AG got a much-needed shot in the arm with a comprehensive risk assessment and revamped security management system.

  • Controlling the Uncontrollable

    Organizations must leverage policy, and harness new protocols and technology to tame wild WLANs.

  • Thinking Ahead

    Information Security's 2006 Priorities Survey signals a transition for security managers from an operational to a more strategic stance.

  • To Catch a Thief

    Forensics tools aren't only used in high-profile cases.

  • Configuresoft's Enterprise Configuration Manager v4.7

    Information Security magazine's contributing editor, Mike Chapple, reviews Configuresoft's Enterprise Configuration Manager v4.7.

  •'s Guide to Thwarting Hacker Techniques

    This guide provides you with a plethora of tips, expert advice and Web resources that offer more in-depth information about hacker techniques and various tactics you can employ to protect your netw...