February 2006

  • Cisco unveils steps toward self-defending network

    In his keynote, CEO John Chambers touted product enhancements that advance his push for networks that can defend themselves without human intervention.

  • The sensation over automation

    In his RSA Conference keynote address Thursday, Internet Security Systems' CEO Tom Noonan plans to discuss his vision of how multiple layers of security can be integrated to provide tighter protect...

  • Keylogger basics

    Keystroke loggers are a serious threat to security. In this tip by contributor Tony Bradley, learn how they work and what you can do to avoid them.

  • Companies still not reporting attacks, FBI director says

    At a BSA Town Hall Meeting, Robert Mueller urged companies to cooperate with law enforcement if its ever to gain ground on cybercriminals.

  • threat modeling

    Threat modeling is a procedure for optimizing network security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of, threats to th...

  • Exceptional exhibitors earn Impact Awards

    Cybertrust takes Best in Show at the RSA Security Conference for its promotional plan. Three others received honors in the second annual event.

  • Gates to open RSA with Microsoft's security vision

    As Microsoft Chairman Bill Gates prepares to offer his company's 2006 security plans, users explain why they're finally starting to trust the software giant.

  • Crypto panel takes on RFID, bashed hash functions

    The lively exchange between some of security's biggest names in the business this year included a wake-up call to update older designs and devise a new hash function standard as well as watch out f...

  • Microsoft 'hearts' security pros with 'Patch Tuesday' updates

    Microsoft's monthly security bulletins include 2 critically ranked flaws, one for Internet Explorer.

  • RSA CEO: Federation has been a disappointment

    In the 10 years since Art Coviello took over as CEO of RSA Security, the company's revenues have swelled to $305 million for fiscal 2004, and the RSA Conference has grown into the information secur...

  • Gates calls for the end of passwords

    Microsoft's chairman outlined a future where code is written more securely and passwords are no more. Can his company get us there?

  • CEOs share vision of safer cyberspace

    RSA's Art Coviello and Sun Microsystems' Scott McNealy offer suggestions for strengthening security and privacy and the public's faith in both.

  • Application development best practices

    Michael Cobb, SearchSecurity.com's application security expert, discusses best practices for specific application development procedures in this Ask the Expert Q&A.

  • RSA 2006: Product announcements

  • ILOVEYOU virus

    The ILOVEYOU virus comes in an e-mail note with "I LOVE YOU" in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Mi...

  • Securing Web logins

    In this identity and access management Ask the Expert Q&A, our expert outlines best practices and techniques for securing Web logins.

  • IBM issues fixes for flaws in Lotus Notes 6.5.4 and 7.0

    IBM Corp. announced fixes for six "highly critical" security flaws that could allow arbitrary code execution in Lotus Notes versions 6.5.4 and 7.0.

  • Microsoft AntiSpyware Beta incorrectly identifies AV software

    A recent signature file for the beta version of Microsoft Windows AntiSpyware incorrectly identifies a registry key of Symantec antivirus software. Removing the identified registry key disables ant...

  • How to transition from a UNIX environment to the security management field

    Learn how to transition to a career in security management, if you were once a UNIX specialist and whether it would be wise to opt for a vendor specific or a vendor neutral certification during thi...

  • Smart tactics for antivirus and antispyware

    AV has become a commodity service with vendors touting value-added features and the ability to protect other parts of the network. This video addresses AV and antispyware from an architectural pers...