-
Raising risk prospects with a new SQL injection threat
"Inference attacks" could deliver up your so-called secure database to an attacker.31 Jul 2005
-
How to tackle VoIP security risks
In this excerpt from Chapter 7 of "VoIP Security," authors James F. Ransome and John Rittinghouse introduce VoIP security risks and offer a strategy for addressing them.29 Jul 2005
-
Should Michael Lynn have kept his mouth shut?
Responsible disclosure is again the hot topic as the infosecurity community debates whether a Black Hat presenter should have divulged a potentially catastrophic flaw.29 Jul 2005
-
The ever-constant restart
Find out how to deal with a system that continuously reboots itself during start up.29 Jul 2005
-
Incident response process brings ROI and peace of mind
In this excerpt of Chapter 2 from ISACA's Cybercrime: Incident Response and Digital Forensics, author Robert Schperberg looks at the benefits of instituting an incident response process.28 Jul 2005
-
Publisher's Note: Compliance 2.0
Learn about Compliance 2.0, which involves continuous process improvement.28 Jul 2005
-
Perspectives: Which security certification best meets your needs?
The pressure is on to earn security certifications to prove your worth.28 Jul 2005
-
Password Security
Symark Software's PowerKeeper 1.428 Jul 2005
-
On The Radar: NIST resources
Help from the Government28 Jul 2005
-
Recent Releases: Security product briefs, August 2005
Learn about the security products released in August 2005.28 Jul 2005
-
Wireless security review: Juniper Networks' Netscreen-5GT Wireless
Juniper Networks' Netscreen-5GT Wireless28 Jul 2005
-
Identity Management: Trustgenix's IdentityBridge Standard Edition
Trustgenix's IdentityBridge Standard Edition28 Jul 2005
-
Hot Pick: Elemental's Elemental Compliance System 1.1
Elemental's Elemental Compliance System 1.128 Jul 2005
-
Ping: Chrisan Herrod
Chrisan Herrod28 Jul 2005
-
Security Bytes: Vulnerabilities plague Sophos and McAfee products
In other news, security holes surface in Opera, Lotus Domino, SAP, Ethereal and IPsec. Meanwhile, Qualys offers free scanning for flaws outlined in SANS Top 20.28 Jul 2005
-
Users in an uproar over Cisco/ISS suit
A Cisco IOS flaw patched three months ago becomes the catalyst for litigation against a security researcher. Black Hat attendees cry foul and say Cisco is in the wrong.28 Jul 2005
-
Security researcher causes furor by releasing flaw in Cisco Systems IOS
A security researcher and the Black Hat security conference faces litigation by Cisco and ISS in the wake of a vulnerability presentation that "could bring down the Internet."28 Jul 2005
-
Combining technology and social engineering: Hacking behind bars
In this excerpt from Chapter 11 of "The Art of Deception: Controlling the Human Element of Security," authors Kevin Mitnick and William L. Simon begin a story that shows how social engineering can ...28 Jul 2005
-
Beefed up OWASP 2.0 introduced at BlackHat
The budding standard for Web applications and services takes center stage at the annual security conference.28 Jul 2005
-
Cisco, Black Hat litigation comes to a close
The vendor and partner ISS settle their dispute over a presentation that resulted in criminal charges and cease and desist orders.28 Jul 2005
Security Management Strategies for the CIO