-
IAM Security School quick quiz
29 Sep 2006
-
More from SearchSecurity September 2006
29 Sep 2006
-
ZERT rekindles third-party patching debate
This week in Security Blog Log: IT security pros express more reservations about third-party patching, including the CEO of a company that released one a few months ago.29 Sep 2006
-
New exploits target Microsoft PowerPoint, IE
Microsoft may have patched the VML flaw in Internet Explorer, but now it faces new threats against the Web browser and PowerPoint.28 Sep 2006
-
Fending off an Active Directory attack
Whether you view the security of Active Directory as a matter of defense or of improving its configuration management, it's a system that must be protected.28 Sep 2006
-
On privacy laws, every state is one of confusion
While California's SB-1386 once seemed like a lone beacon in the night, many states now have laws that attempt to protect consumers' sensitive data. However, it's getting increasingly difficult to comply...28 Sep 2006
-
Key elements when building an information security program
Discover how to achieve information security governance by learning the essential elements behind a sucessful security program.27 Sep 2006
-
Identity and Access Management Security School final quick quiz
27 Sep 2006
-
IAM Security School Final Exam quick quiz
27 Sep 2006
-
Burton Group: Web application firewall market maturing
Web application firewalls have improved performance and functionality, but it still takes time, knowledge and skills to implement them, according to a recent Burton Group report.27 Sep 2006
-
Symantec Dark Vision app monitors underground IRC servers
The research project keeps tabs on the hacker underground, providing new insight on activities like credit card theft and spamming. Likely a compelling law-enforcement tool, for now the security gi...26 Sep 2006
-
IT pros worried about unsecured devices
IT admins keep working to make networks secure even as more unsecured personal gadgets, like smart phones and BlackBerrys, find their way into companies.26 Sep 2006
-
How can I prevent an FU rootkit from spreading throughout a network?
Information security threats expert, Ed Skoudis, explains the best way to stop an FU rootkit outbreak. Learn how to clean up your infected machine and prevent the malware from spreading across your...26 Sep 2006
-
Nmap parsers and interfaces
SearchSecurity expert contributor Michael Cobb continues his series on Nmap with a detailed look at Nmap parsers and interfaces.26 Sep 2006
-
IT Infrastructure Library: Regulatory compliance benefits and training options
The IT Infrastructure Library (ITIL) can assist organizations in their regulatory compliance efforts. This article explains how and outlines training options for security practitioners interested i...26 Sep 2006
-
How to reduce wireless driver security vulnerabilities
So, you have your up-to-date antivirus software with personal firewalls and antispam, antispyware and privacy control features. SearchSecurity.com's information security threats expert, Ed Skoudis,...26 Sep 2006
-
Microsoft patches IE flaw early
Updated: Attacks against the Internet Explorer VML flaw were increasing to the point where Microsoft saw the need to fix it outside its normal patch cycle.26 Sep 2006
-
How can I prevent spammers from populating my mailing list?
SearchSecurity.com's information security threats expert, Ed Skoudis, explains the workings of a spambot and teaches the strategies you need to counter spammers and clean up your mailing lists.26 Sep 2006
-
What types of Web services can compromise Web server security?
SearchSecurity.com expert Michael Chapple reveals how a service overload can leave your system open to attacks.26 Sep 2006
-
What is 'Trixie' and how do we remove it?
There are several tools that call themselves Trixie. Luckily, SearchSecurity.com's information security threats expert, Ed Skoudis, can tell the good from the bad and will help you rid your system ...26 Sep 2006
Security Management Strategies for the CIO