February 2006 | Archive by Month | SearchSecurity.com | Page 5

February 2006

  • How VPNs interact with instant-messaging applications

    In this Ask the Expert, application security expert Michael Cobb reviews how an enterprise-wide VPN works and whether it encyrpts and protect instant-messaging communications.

  • Security certification recommendations

    In this Ask the Expert Q&A our security management expert recommends certifications that can help professionals transition to the information security field.

  • Architectural Risk Analysis: Traditional Risk Analysis Terminology

  • The pros and cons of proxy firewalls

    In this Ask the Expert Q&A, our application security expert reviews the pros and cons of proxy firewalls.

  • Best practices and tools for non-MS IIS users

    Learn what best practices and tools non-MS IIS users can use in this application security Ask the Expert Q&A.

  • Images: Nyxem infests America, Europe

    This map shows the locations of machines that have been infected with Nyxem.E as of midday Thursday. The worm appears to have spread over large portions of the U.S. and Europe.

  • What's new in the revision of ISO 17799

    SearchSecurity expert Michael Cobb outlines the latest changes to the ISO 17799 standard.

  • Security Blog Log: Surprise! IE 7 beta has a flaw

    Security researchers in the blogosphere are buzzing about a flaw in IE 7. Should users wait before taking the browser for a spin?

  • So far, Nyxem damage minimal

    AV specialists say enterprises have dodged Nyxem's file-corrupting bullet thus far. But a true casualty count may not be known for a few days.

  • AV upstarts tout need for speed in zero-day fight

    Data suggests upstart European antivirus firms are reacting more quickly to emerging zero-day threats, but opinions differ on whether speed is an important factor when choosing a vendor.

  • Intrusion Prevention Fundamentals: Signatures and Actions

    Before buying an IPS device, it's important to understand exactly what you're getting. Different products may claim to have the same features, but because marketing terminology isn't industry-stand...

  • Nyxem: Why the sky may not fall Feb. 3

    IT pros say enterprises have a good chance of weathering Nyxem's wrath Friday because of the ample warning and timely action from AV firms. But don't exhale just yet.

  • Mozilla issues Firefox mega-fix

    The digital underground could exploit as many as seven flaws to bypass security restrictions, compromise sensitive data and launch cross-site scripting attacks.

  • Owning the C-suite

    If you've found yourself on the losing end of a few too many battles, and security is suffering because of a lack of support from top executives, a bit of positive social engineering may be just th...

  • Products of the Year 2006

    Antispyware; Antivirus; Authentication; E-mail Security; Identity & Access Management; Intrusion Detection; Intrusion Prevention; Network Firewall; Remote Access; Network Security Management; Vulne...

  • Game Over?

    Where do you turn when the security vendor you've banked on gets gobbled up?

  • Stopping the Next Heist

    Storage and backup systems are rife with vulnerabilities. Take seven steps to secure them, or risk unflattering headlines and legal problems.

  • IM threats grow, response lags

    Reports from IMlogic and Akonix show that IM threats are growing while IT shops are behind in their preparedness. In fact, many firms are still totally unaware of just how much danger actually exists.

  • Mapping Windows client certificates

    In this Ask the Expert Q&A, Michael Cobb explains how to properly map Windows client certificates to access a Web site.

  • 2006 Products of the Year: Vulnerability management

    We asked. You answered. Here are your choices for best vulnerability management product of the year.