August 2006

  • Single Sign-On Explained

    SPECIAL Managing identity and access can be as easy as 1, 2, 3.
    1 is the loveliest number

  • It's a Dirty Job...

    SERVICES But someone has to handle vulnerability management. Giving it to an outsourcer seems like an easy solution, but enterprises need to first understand the gritty...

  • Black Hat preview: Spotlight on Vista, new exploits

    Researchers will pick apart Windows Vista and shine a light on security holes affecting NAC, VoIP, Web applications and databases at this year's Black Hat USA 2006 gathering.

  • Risk-based authentication

    The concept of risk-based authentication is becoming popular for some online business-to-consumer transactions, particularly those conducted with banks and other financial services firms.

  • SearchSecurity.com special coverage: Black Hat 2006

    Check here regularly as reporters from SearchSecurity.com and Information Security magazine post the latest news and tidbits from Black Hat 2006 in Las Vegas.

  • Third-party Microsoft patches could get new life

    News analysis: Microsoft's process for providing security fixes is as orderly and predictable as it has ever been, but some believe the software giant's methodical nature may lead to more third-par...

  • McAfee products vulnerable to code execution flaw

    VirusScan, Personal Firewall Plus, SpamKiller and other McAfee products are reportedly vulnerable to an unspecified remote code execution flaw.