-
More from SearchSecurity.com -- December 2006
Highlights from the December 2006 issue of Information Security magazine.29 Dec 2006
-
Comodo Firewall: An intelligent way to protect against application attacks
Looking for a solid firewall replacement? Contributing editor, Scott Sidel, recommends Comodo Firewall, an open source tool that can prevent application attacks.28 Dec 2006
-
Looking back at information security in 2006
In this special edition of Security Wire Weekly, senior news writer Bill Brenner reviews his top interviews of 2006. Highlights include Oracle's Darius Wiles, SPI Dynamic's Billy Hoffman, Dan Geer,...27 Dec 2006
-
Skype Trojan: Much ado about nothing?
This week in Security Blog Log: A Trojan horse has captured headlines by targeting Skype users. But some believe the threat is being blown out of proportion.22 Dec 2006
-
Microsoft investigates Windows Vista flaw
Local users could gain elevated system privileges and run malicious commands by exploiting an error within the Windows server library. Vista is among the OS versions affected.22 Dec 2006
-
What enterprise tools can scan files for sensitive data?
Given the many recent high-profile data breaches, organizations seem keen on securing their sensitive data, including credit card and social security numbers. In this expert Q&A, SearchSecurity.com...22 Dec 2006
-
Should log traffic be encrypted?
Should you be encrypting your security log transmissions? "It depends!" explains Mike Chapple in this SearchSecurity.com expert Q&A.22 Dec 2006
-
How should a desktop firewall policy manage open ports?
Having a standard desktop firewall policy is an important security measure. In this expert Q&A, network security pro Mike Chapple reviews where to begin when enacting these restrictions.22 Dec 2006
-
Which wireless security assessment tools are commercially available?
Most auditors use open source tools to perform wireless assessments. There are other commerical options, though, as network security expert Mike Chapple explains in this SearchSecurity.com Q&A.22 Dec 2006
-
Using steganography for securing data, not concealing it
Steganography is a useful technique for securely storing sensitive data, but the difficulty in detecting its usage can create an opportunity for digital miscreants. Michael Cobb explains how to ens...21 Dec 2006
-
Websense acquiring PortAuthority Technologies
Meanwhile: Sony BMG settles lawsuit over rootkit technology; Apple fixes a Mac OS X glitch; and Microsoft releases the first draft of PatchGuard APIs.20 Dec 2006
-
Check Point gets big IDS boost from NFR deal
Analysts say Check Point would gain much-needed intrusion detection and prevention capabilities through its acquisition of NFR Security. The deal should erase bad memories of the aborted Sourcefire...20 Dec 2006
-
Microsoft releases Vista APIs to security vendors
Microsoft released a draft set of programming interfaces allowing security vendors to develop software using the Windows kernel on 64-bit systems.20 Dec 2006
-
Mozilla issues fixes for Firefox, SeaMonkey and Thunderbird
Digital miscreants could exploit flaws in Mozilla's popular Firefox browser to bypass security programs, access sensitive information and conduct cross-site scripting attacks.20 Dec 2006
-
Who should manage the firewall?
Maintaining a firewall is not an easy task, especially when business rules narrowly define which tasks should be performed by network administrators and which should be handled by information secur...19 Dec 2006
-
Report: Spam, phishing attacks growing more sophisticated
Security researchers at MessageLabs and Symantec are reporting a significant rise in more sophisticated botnet and phishing attacks, putting a stranglehold on corporate communications.19 Dec 2006
-
Welcome to SearchSecurity.com
SearchSecurity.com, the Web's best security-specific information resource for enterprise IT professionals, offers you access to all types of security training resources in one convenient location. ...19 Dec 2006
-
Criminals find safety in cyberspace
A new report from McAfee shows how criminals are enjoying a sense of safety and anonymity in cyberspace that they never had on the street. And they're making more money.18 Dec 2006
-
Database compliance demystified
As security professionals grapple with both federal mandates and industry-specific guidance, many wonder how best to approach these issues in terms of data protection and security. In this tip, Jam...18 Dec 2006
-
Check Point to acquire NFR Security
In other news: New flaws affect Microsoft, McAfee and Yahoo Messenger, while Trend Micro discovers a so-called Vista zero-day flaw on sale for $50,000 a sample.18 Dec 2006
Security Management Strategies for the CIO