May 2006 | Archive by Month | | Page 4

May 2006

  • Digital doomsday can be avoided with preparation

    The U.S. Cyber Consequences Unit says enterprises must take specific measures to shore up their defenses, otherwise they could be vulnerable to attackers who not only steal data, but also manipulat...

  • QRadar 5.0 offers robust SIM

    Hot Pick: SIMs are maturing to a level where they are practical and effective, and Q1 Labs has moved to the forefront with its innovative QRadar 5.0.

  • Military students get lesson in cyberwarfare

    Students from the nation's most recognized military academies recently took part in a contest that not only tested their network defense skills, but also gave them a taste of real-world information...

  • TippingPoint X505 hits the sweet spot

    Product review: This appliance combines IPS, firewall and VPN technologies, and supports around 500 concurrent users.

  • Nmap 4.01 improves upon past releases

    Product review: Nmap 4.01's core port-scanning engine is mature, robust and capable of scanning both IPv4 and IPv6 hosts, independent of whether or not they are protected by firewalls.

  • ping of death

    On the Internet, ping of death is a denial of service (DoS) attack caused by an attacker deliberately sending an IP packet larger than the 65,536 bytes allowed by the IP protocol.

  • How to protect your company against cybercrime

    Thanks to the Internet's inherent anonymity, widespread reach and disjointed law enforcement status, cybercriminals have a lot to gain -- and enterprises have a lot to lose. In this tip, SearchSecu...

  • Wacky Web misuses highlight internal risks

    One vendor says selling corporate assets on eBay, spying on coworkers and running illegal gambling rings are just a few examples of the crazy stunts employees will try when given unchecked use of t...

  • XML Web services tutorial: How to improve security in Web services

    Securing XML is an essential element in keeping Web services secure. This Learning Guide is a compilation of resources that review different types of XML security standards and a...

  • How do I secure Windows NT/XP using the NetBIOS and LDAP protocols?

    In this Ask the Expert Q&A, our security threats expert, Ed Skoudis, discusses how to secure Windows NT/XP using the NetBIOS and LDAP protocols and what steps should be taken to protect against i...

  • How to protect the network from DoS attacks

    In this Ask the Expert Q&A, our security threat expert, Ed Skoudis, discusses how a new type of DoS attack operates and what you can do to protect your network.

  • Security Bytes: Phishing scheme targets American Express customers

    Meanwhile: Personal data on 66,000 newspaper subscribers is leaked online, and a Trojan horse hijacks data and demands ransom.

  • Access security with KoolSpan's SecurEdge

    Information Security magazine's technical editor Brent Huston reviews KoolSpan's SecurEdge.

  • Is Microsoft Trustworthy Yet?

    PLATFORM SECURITY The fourth anniversary of its Trustworthy Computing Initiative is marked with mixed reviews from users.

  • Spy Catchers

    PRODUCT REVIEW We take a close look at seven antispyware products. Can they keep your corporate desktops free of prying eyes?

  • Reborn Identity

    IDENTITY MANAGEMENT GM's Jarrod Jasper drives a common user profile across all systems.

  • Swiping Back

    INDUSTRY COMPLIANCE With the goal of reducing fraud, the credit card associations' PCI standard scores points for clarity.

  • Safety Net

    BITS & BOLTS Microsoft's .NET development framework can help your Web apps perform securely.

  • Ping

    Tony Spurlin

  • Editor's Desk: Show me the money

    Dollar Signs