February 2006

  • Keylogger basics

    Keystroke loggers are a serious threat to security. In this tip by contributor Tony Bradley, learn how they work and what you can do to avoid them.

  • The sensation over automation

    In his RSA Conference keynote address Thursday, Internet Security Systems' CEO Tom Noonan plans to discuss his vision of how multiple layers of security can be integrated to provide tighter protect...

  • Elemental Security, Imperva top Innovation Station Showdown

    Eleven security startups vye for awards at the RSA Security conference.

  • Cisco fixes TACACS+ authentication vulnerabilities

    Cisco Systems announced the availability of free software to fix TACACS+ authentication vulnerabilities, which could allow a malicious user to bypass security in affected systems.

  • threat modeling

    Threat modeling is a procedure for optimizing network security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of, threats to th...

  • CEOs share vision of safer cyberspace

    RSA's Art Coviello and Sun Microsystems' Scott McNealy offer suggestions for strengthening security and privacy and the public's faith in both.

  • RSA CEO: Federation has been a disappointment

    In the 10 years since Art Coviello took over as CEO of RSA Security, the company's revenues have swelled to $305 million for fiscal 2004, and the RSA Conference has grown into the information secur...

  • Gates calls for the end of passwords

    Microsoft's chairman outlined a future where code is written more securely and passwords are no more. Can his company get us there?

  • Gates to open RSA with Microsoft's security vision

    As Microsoft Chairman Bill Gates prepares to offer his company's 2006 security plans, users explain why they're finally starting to trust the software giant.

  • Exceptional exhibitors earn Impact Awards

    Cybertrust takes Best in Show at the RSA Security Conference for its promotional plan. Three others received honors in the second annual event.

  • RSA 2006: Product announcements

  • Application development best practices

    Michael Cobb, SearchSecurity.com's application security expert, discusses best practices for specific application development procedures in this Ask the Expert Q&A.

  • Microsoft 'hearts' security pros with 'Patch Tuesday' updates

    Microsoft's monthly security bulletins include 2 critically ranked flaws, one for Internet Explorer.

  • Crypto panel takes on RFID, bashed hash functions

    The lively exchange between some of security's biggest names in the business this year included a wake-up call to update older designs and devise a new hash function standard as well as watch out f...

  • ILOVEYOU virus

    The ILOVEYOU virus comes in an e-mail note with "I LOVE YOU" in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Mi...

  • How to transition from a UNIX environment to the security management field

    Learn how to transition to a career in security management, if you were once a UNIX specialist and whether it would be wise to opt for a vendor specific or a vendor neutral certification during thi...

  • Microsoft AntiSpyware Beta incorrectly identifies AV software

    A recent signature file for the beta version of Microsoft Windows AntiSpyware incorrectly identifies a registry key of Symantec antivirus software. Removing the identified registry key disables ant...

  • Securing Web logins

    In this identity and access management Ask the Expert Q&A, our expert outlines best practices and techniques for securing Web logins.

  • IBM issues fixes for flaws in Lotus Notes 6.5.4 and 7.0

    IBM Corp. announced fixes for six "highly critical" security flaws that could allow arbitrary code execution in Lotus Notes versions 6.5.4 and 7.0.

  • Smart tactics for antivirus and antispyware

    AV has become a commodity service with vendors touting value-added features and the ability to protect other parts of the network. This video addresses AV and antispyware from an architectural pers...