-
Security pros get tough with users
A new survey suggests infosecurity officers demand tough sanctions against enterprise users who give up private information through social engineering or surf unsafe Web sites.28 Feb 2005
-
Tech Trivia: Trojan responsible for financial loss
Test your knowledge of recent security events.27 Feb 2005
-
Tech Trivia answer: Trojan responsible for financial loss
Tech Trivia: Trojan blamed for financial loss27 Feb 2005
-
Security Bytes: Cisco patch available for ACNS flaws
Workaround outlined for new php exploit. IBM issues patch for DB2 flaw. Payroll service goes offline to investigate security claims , and BoA loses personal data on customers.25 Feb 2005
-
Mozilla fixes security hole
Mozilla has fixed a spoofing flaw discovered in multiple browsers earlier this month.25 Feb 2005
-
Security hole in multiple Trend Micro products
An attacker could exploit a flaw in multiple Trend Micro products to launch malicious code.25 Feb 2005
-
Secure remote access points and configure connections to avoid a hack
This installment in our series focuses on poorly secured remote access points that can bypass firewalls and intrusion detection systems and give hackers the key to the candy store.25 Feb 2005
-
Security Bytes: IPS devices put to the test
In other news, nation's first spim arrest made, Bank of America adds two-factor authentication and (ISC)2 CEO retires.24 Feb 2005
-
Tech Trivia: Answer -- When is Patch Tuesday?
Question of the day24 Feb 2005
-
ChoicePoint CISO on the hot seat, but also firing back
ChoicePoint CISO Rich Baich has his hands full dealing with a data breach, and the ensuing media storm that he says has mislabled this a hack.24 Feb 2005
-
Outsourcing IT services: Is it worth the security risk?
Kevin Beaver examines the risks to consider when contemplating outsourcing your IT services.23 Feb 2005
-
SP2 fix not your typical security update
Microsoft releases a patch for SP2 that may surprise some users, given that it breaks with the Patch Tuesday cycle and was unaccompanied by a security bulletin.23 Feb 2005
-
Security and Paris Hilton
How can you use the example of the foolish heiress to spur security awareness for Bluetooth and mobile devices in your enterprise?23 Feb 2005
-
Tech Trivia: Looking forward to IE 7.0
When will the beta version of IE 7.0 be released?22 Feb 2005
-
Tech Trivia: Answer, Feb. 23, 2005
Daily security quiz22 Feb 2005
-
Security holes affect multiple Linux/Unix products
Attackers could exploit two flaws in cURL to launch malicious code on a variety of Linux-based operating systems.22 Feb 2005
-
Updated: Worm poses as FBI mail, dirty Paris Hilton video
AV firms say a new member of the Sober family tries to trick victims into thinking it's an X-rated video of the hotel heiress.22 Feb 2005
-
Roberta Bragg's 10 Windows hardening tips in 10 minutes
A Windows security expert helps you harden your systems in ten simple steps.21 Feb 2005
-
Big Buyer vs. Big Brother: Which is better at securing enterprises?
Is the marketplace or the government in a better position to tell companies to clean up their security problems?21 Feb 2005
-
Tech Talk: Answer, Feb. 22, 2005
Daily word quiz21 Feb 2005
Security Management Strategies for the CIO