May 2006 | Archive by Month | | Page 3

May 2006

  • Nmap: A valuable open source tool for network security

    Open source tool Nmap is a popular choice amongst hackers and security pros alike for network mapping, port-scanning and testing for network vulnerabilities.

  • Security Blog Log: Data storage bills go to extremes

    This week, lawmakers miss the middle ground when it comes to how long electronic data should be stored. Meanwhile, a hacker defaces electronic subway signs to suggest prime minister is a monster.

  • Monster fix for Mac OS X, QuickTime

    Apple Computer Inc. has patched more than 25 flaws in its operating system and updated its media player to address 12 vulnerabilities.

  • Opinion: 'Student' CISSPs put cert's value in jeopardy

    Contributor Sean Walberg says it's a mistake for colleges to offer security certifications along with undergraduate degrees because it's a disservice to the students and dilutes the value of the cert.

  • How to recover your network after a security breach

    For SMBs that don't have a budget to invest in a full-scale network management system, recovering from a security breach requires more work from the IT staff than just pressing a few buttons. In th...

  • SSO: Strong authentication in enterprise deployments

    By understanding the right amount of protection required, security pros can ensure SSO improves productivity, saves money and, most importantly, protects corporate information.

  • Inside MSRC: Wisdom on Exchange security

    Microsoft's trio of May security bulletins includes a critical update for Exchange. The Microsoft Security Response Center's Christopher Budd explains why that particular bulletin may be more compl...

  • Messaging security is the name of the game at Interop

    Messaging security was a hot Interop topic, rivaled only by every other aspect of security. Vendors rolled out wares to protect messaging systems and other points on the network.

  • Security Bytes: Symantec vows to fend off Microsoft

    Meanwhile: A virus infects Microsoft Excel files posing as a fantasy soccer spreadsheet and Sophos patches a security hole in its antivirus products.

  • Exchange, Windows focus of latest Microsoft fixes

    The software giant releases its May security bulletins and two of the three are rated critical. Issues with Exchange and Flash Player are addressed, but none fixes the latest IE flaws.

  • Security Bytes: Blog beatdown blamed on antispam vendor

    Meanwhile: Ohio University announces a data breach; an antispyware activist sues Yahoo; Linux gets buggier and Vista security comes under the microscope.

  • Automating Network Compliance and Security

    In this excerpt from Chapter 2 of "The Shortcut Guide to Automating Network Management and Compliance," author Don Jones discusses how networks become non-compliant, and examines how automation can...

  • Oracle refuses to learn its lesson, experts say

    Oracle critics say the database giant sits on known flaws for too long, leaving its applications open to attack. Is it time for infosec pros to extract Oracle products?

  • SnortSnarf

    SnortSnarf is a program that was designed for use with Snort, a security program used mainly with Linux networks. SnortSnarf converts the data from Snort into Web pages. It was written in Perl by J...

  • Security Blog Log: Are certifications silly?

    One blogger thinks so. Also this week: Apple is criticized over a TV ad suggesting it has no viruses and the Oracle CSO's blog lies dormant.

  • Integrated security rolls into switch market

    Following the launch of a new network switch that combines policy-based security technology with standard switching, experts say combo gear that thwarts and contains security threats at the network...

  • Intrusion Defense Final Exam Answers

  • Where hard drives go to die, or do they?

    A number of enterprises are using asset disposal firms to ensure sensitive corporate data is destroyed, but the process is hardly foolproof. In fact, a convicted felon could have his hands on your ...

  • QRadar 5.0 offers robust SIM

    Hot Pick: SIMs are maturing to a level where they are practical and effective, and Q1 Labs has moved to the forefront with its innovative QRadar 5.0.

  • Military students get lesson in cyberwarfare

    Students from the nation's most recognized military academies recently took part in a contest that not only tested their network defense skills, but also gave them a taste of real-world information...