-
Security Bytes: ISS warns of new Microsoft Windows flaw
Attackers could exploit the latest Microsoft Windows flaw to crash vulnerable machines. Meanwhile, Symantec fixes a Brightmail AntiSpam flaw.31 Jul 2006
-
Automated provisioning quiz answers
27 Jul 2006
-
Security Bytes: IKE protocol flaw affects Cisco gear
Also: Microsoft will push IE7 as a high-priority update to Windows XP and Windows 2003 customers and MessageLabs releases new spam data as an analyst ponders the vendor's future.27 Jul 2006
-
Linux patch problems: Your distro may vary
As Linux grows, choosing a version that fixes flaws quickly is critical. However, as Edmund X. DeJesus discovered, some Linux distributions publish security fixes faster than others.27 Jul 2006
-
DHS puts Zitz in charge of cybersecurity division
Career intelligence officer Robert S. Zitz has taken over day-to-day operations of the National Cyber Security Division, but the Department of Homeland Security still has numerous digital defense p...27 Jul 2006
-
Blue Cross bears burden of 'no wireless' policy
Blue Cross of Idaho had a "no wireless" policy on paper but never really enforced it. That is, until a team of auditors said the company had better do something.27 Jul 2006
-
Authenticating Windows
Three options for Windows authentication with eSSO clients.27 Jul 2006
-
Mozilla issues critical security updates
The open source group has issued new versions of Firefox, Thunderbird and SeaMonkey to fix 13 software security flaws, eight of which have been deemed critical.27 Jul 2006
-
Netscape.com hit with cross-site scripting attack
Update: The popular Web portal was victimized by a cross-site scripting attack early Wednesday, but Netscape says the problem has been addressed and its users are now safe.26 Jul 2006
-
Employee monitoring should be done with care
Employee monitoring is on the rise as organizations try to safeguard their sensitive information and increase productivity. However, one security expert says there are several important questions t...26 Jul 2006
-
NAC helps aerospace firm's network blast off
An aerospace firm needed to protect sensitive data and make it available to guests, contractors and partners from other companies, and a NAC product featuring separate VLANs did the trick.26 Jul 2006
-
Archives and data protection: The important differences
While the two are both equally important, it's vital that you don't confuse archiving with data protection. Marc Staimer explains their differences.26 Jul 2006
-
Image spam paints a troubling picture
Vendors say as many as one in four spam messages are now image-based, as attackers more commonly use hard-to-detect .jpg and .gif image files to bypass spam filters.26 Jul 2006
-
Disaster recovery report card: Measuring your company's disaster recovery profile
Disaster recovery planning is challenging because you don't know what you're planning for or how well your disaster recovery plan will hold up in the face of an emergency. Use this report card to m...25 Jul 2006
-
CRLF injection attacks: How they work and what to do about them
CRLF injection attacks may not be as popular as other application attacks, but they can be just as devastating. Learn how CRLF injection attacks are executed and how to defend your organization aga...25 Jul 2006
-
Symantec, Yahoo partner on security
The deal will allow Symantec to offer client security products to Yahoo's users. It could also help Symantec gain leverage against Microsoft.25 Jul 2006
-
NAC boosts security for Sun Microsystems
Cisco's controversial NAC technology has helped Sun Microsystems secure its network, despite analysts who advise waiting until NAC matures and industry-wide standards emerge.25 Jul 2006
-
Security Bytes: New Microsoft exploits in the wild
The exploits target issues Microsoft patched earlier this month. Meanwhile, flaws are reported in Oracle for OpenView and a Mozilla Firefox keystroke logger is on the loose.25 Jul 2006
-
Nmap: Firewall configuration testing
This tip, in our Nmap manual series, explains how Nmap can be used to test the effectiveness of a firewall configuration. Learn how to use the open source network mapper to better understand how y...24 Jul 2006
-
Security training highlights need for continuity planning
Organizations wondering how to respond to simultaneous security incidents might learn a few things from the drills being carried out by the State of Delaware.24 Jul 2006
Security Management Strategies for the CIO