-
Secure email exchange: Establishing security associations
What happens if a security association can not be established during an email exchange? Michael Cobb has the answer.28 Feb 2006
-
Oracle releases critical, out-of-cycle patch
Two months ahead of its next scheduled patch release, the database giant fixes critical security holes in its E-Business Suite. The flaw is in the software's diagnostic feature.28 Feb 2006
-
Dealing with passwords that can't authenticate to the server
Learn how to deal with passwords that can't authenticate to the server, and where to find resources that will help you troubleshoot this problem.28 Feb 2006
-
Bingo card authentication systems
In this Ask the Expert Q&A, our identity and access management expert explains what a "bingo" card authentication system is, how it works and how secure it is.28 Feb 2006
-
How to securely distribute one-time password tokens
In this Ask the Expert Q&A, our identity and access management expert examines how to properly distribute one-time password (OTP) tokens to your employees so they don't leave your systems open to ...28 Feb 2006
-
IBM and friends tout open source ID management
Big Blue is teaming up with Novell and others on Project Higgins, an open source project to simplify and secure Internet ID management.28 Feb 2006
-
Future CISOs need a 'softer side'
Experts weigh in on what it now takes to move beyond a cubicle to the C-suite, and it isn't delving even deeper into manuals and schemas.28 Feb 2006
-
Outsourcing: Understanding the business risks
In this Ask the Expert Q&A Shon Harris, our security management expert reviews business risks associated with outsourcing security jobs to developing countries and learn how security managers can ...27 Feb 2006
-
Yahoo fixes SSL flaw in Business E-mail
The company made adjustments to the program after a security expert discovered user IDs and passwords were being transmitted in plaintext.
Editor's note: This article now includes Yahoo's e-mail...27 Feb 2006 -
'Crossover' malcode could jump from PC to handheld
Researchers say they've found the first malicious code built to spread from desktop PCs to wireless handhelds, and it could signal a shift in the threat landscape.27 Feb 2006
-
Making sense of the maze
The program director of regulatory compliance for the Object Management Group discusses a new project known as Compliance Global Regulatory Information Database, which should help businesses manage...27 Feb 2006
-
Threats don't diminish Mac's reputation
IT pros still believe Mac OS X is more secure than Windows, despite recent challenges, but that isn't likely to help it unseat Windows in the enterprise.27 Feb 2006
-
More from SearchSecurity -- March 2006
Highlights from the February 2006 issue of Information Security Magazine.27 Feb 2006
-
anonymous Web surfing (Web anonymizer, SafeWeb)
Anonymous Web surfing allows a user to visit Web sites without allowing anyone to gather information about which sites the user visited.24 Feb 2006
-
Sourcefire's Roesch pledges long, open source life for Snort
SAN JOSE, Calif. -- You might not expect it, but one of the security industry's most successful executives shares a house with his mother-in-law.
In fact, Martin Roesch, founder and chief technology
...24 Feb 2006 -
Hey, Mac. Is that a worm in your Apple?
In this week's Security Blog Log, Bill Brenner looks at the furor over new threats targeting Mac OS X -- long considered a more secure alternative to Windows.24 Feb 2006
-
Security Bytes: Shockwave flaw fixed
In other news, McAfee employee data goes missing and an IT exec gets eight years in prison for data theft.24 Feb 2006
-
CAPTCHA (Completely Automated Public Turing Test to tell Computers and Humans Apart)
A CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a test, used with challenge-response systems, that's designed to differentiate humans from automated sende...23 Feb 2006
-
Smile! You're about to be hacked
Security experts at last week's RSA conference warn that video files may be the next great threat vector, providing enterprises some interesting 'codec moments.'23 Feb 2006
-
Security Bytes: Microsoft frowns on iDefense hacking challenge
Meanwhile, Google Desktop Beta carries security risk; Sophos update leads to false positives for Mac malcode; and a Kaspersky glitch causes Microsoft users e-mail trouble.22 Feb 2006
Security Management Strategies for the CIO