-
Would Blue Pill create a matrix for PCs?
This week in Security Blog Log: A researcher creates fake reality for Windows Vista's anti-malware sensors. Not all bloggers are impressed.30 Jun 2006
-
iTunes flaw could enable malicious code
Apple has fixed a critical hole that attackers could exploit to launch malicious code on PCs, including corporate clients, running the popular music software.30 Jun 2006
-
Active directory users finding their way
Many IT shops use Microsoft Active Directory to manage network access. Some say it's difficult, but others use it to successfully handle directory services, group policy and provisioning.29 Jun 2006
-
Cisco fixes multiple wireless flaws
The vendor has addressed vulnerabilities in its Wireless Control System and Wireless Access Point that could be exploited to bypass security features and access sensitive data.29 Jun 2006
-
Social engineering's new tricks present bigger dangers
While social engineering has already helped many worms and viruses propagate, researchers believe attackers may soon escalate their assaults by exploiting end-users incompetence, naivety and greed.29 Jun 2006
-
RSA Security acquired by EMC for $2.1 billion
EMC confirms that it will buy RSA Security for just under $2.1 billion. Observers say RSA faced a choice of either selling out at its peak or carrying on with a questionable strategy dependant on a...29 Jun 2006
-
Data breaches may be new boon for mobile security
According to The 451 Group's Nick Selby, not only will recent data breaches encourage more companies to implement mobile device security technologies, but a number of mobile security vendors are po...29 Jun 2006
-
Career management 101 for information security pros
Eight questions to help information security professionals determine if their career is on the right track.29 Jun 2006
-
Stolen VA laptop found
It remains to be seen if personal data on millions of veterans and active duty personnel was copied from the laptop or compromised in any other way.29 Jun 2006
-
Report: EMC may be near deal to purchase RSA Security
RSA Security has been looking for a buyer for several months, according to The New York Times, and its board of directors may accept an acquisition offer as soon as this weekend.29 Jun 2006
-
Can you manage smartphones and Pocket PC phones using Windows Group Policy?
Learn how to manage this risk smartphones and other like mobile devices introduce into your network, in this network security Ask the Expert Q&A.28 Jun 2006
-
Can Snort read multi-platform syslogs?
Most security pros are aware of Snort's network intrusion detection capabilities, but can this freeware tool read and monitor multi-platform syslogs? SearchSecurity's network security expert Mike C...28 Jun 2006
-
Will wireless carriers adopt a device security philosophy?
With the proliferation of wireless devices, some security pros wonder if wireless carriers will provide device security solutions. SearchSecurity's network security expert Mike Chapples tackles th...28 Jun 2006
-
Looking ahead to life without passwords
Security pros know that passwords are nothing but trouble. For them, single-sign on, two-factor authentication and federated ID represent the path to stronger authentication.28 Jun 2006
-
Security Bytes: Strategic shift at Symantec leads to 80 layoffs
New flaws and exploits surface in Internet Explorer; Apple fixes Mac OS X bugs; a new data security bill is filed; and F-Secure fixes a flaw in its antivirus products.28 Jun 2006
-
Evaluating the costs associated with securing, supporting and maintaining a VPN
In need of a new VPN? Learn what to consider before you sit down with management or network admins to discuss the associated costs of a VPN.28 Jun 2006
-
Preparing for auditors: Checklists for before, during and after an IT audit
Prepare for your next IT audit with these handy checklists.27 Jun 2006
-
When access management becomes rocket science
Security can be a hard sell beyond the IT realm, even for security pros at NASA. But nothing motivates people like regulatory pressure and a fear of being the next data breach headline.27 Jun 2006
-
Inside the numbers: Access (out of) control?
In April, SearchSecurity.com surveyed 358 IT professionals from a variety of industries regarding their identity and access management programs. Here is a look at some of the questions we asked and...27 Jun 2006
-
Security policies: Don't be an army of one
Despite the increasing importance of security policies due to regulations like SOX and HIPAA, information security professionals are often left on their own to develop, implement and enforce inform...27 Jun 2006
Security Management Strategies for the CIO