-
IAM Security School quick quiz
29 Sep 2006
-
ZERT rekindles third-party patching debate
This week in Security Blog Log: IT security pros express more reservations about third-party patching, including the CEO of a company that released one a few months ago.29 Sep 2006
-
More from SearchSecurity September 2006
29 Sep 2006
-
On privacy laws, every state is one of confusion
While California's SB-1386 once seemed like a lone beacon in the night, many states now have laws that attempt to protect consumers' sensitive data. However, it's getting increasingly difficult to comply...28 Sep 2006
-
New exploits target Microsoft PowerPoint, IE
Microsoft may have patched the VML flaw in Internet Explorer, but now it faces new threats against the Web browser and PowerPoint.28 Sep 2006
-
Fending off an Active Directory attack
Whether you view the security of Active Directory as a matter of defense or of improving its configuration management, it's a system that must be protected.28 Sep 2006
-
Key elements when building an information security program
Discover how to achieve information security governance by learning the essential elements behind a sucessful security program.27 Sep 2006
-
Burton Group: Web application firewall market maturing
Web application firewalls have improved performance and functionality, but it still takes time, knowledge and skills to implement them, according to a recent Burton Group report.27 Sep 2006
-
Identity and Access Management Security School final quick quiz
27 Sep 2006
-
IAM Security School Final Exam quick quiz
27 Sep 2006
-
How do L2TP and PPTP differ from IPsec?
There are different protocol options when setting up a VPN tunnel. SearchSecurity.com expert Mike Chapple reviews the choices and reveals the one that is most secure.26 Sep 2006
-
IT Infrastructure Library: Regulatory compliance benefits and training options
The IT Infrastructure Library (ITIL) can assist organizations in their regulatory compliance efforts. This article explains how and outlines training options for security practitioners interested i...26 Sep 2006
-
How can I prevent spammers from populating my mailing list?
SearchSecurity.com's information security threats expert, Ed Skoudis, explains the workings of a spambot and teaches the strategies you need to counter spammers and clean up your mailing lists.26 Sep 2006
-
Can email header information be used to track down spoofers?
Expert Mike Cobb explains how to use your received headers to trace unwanted emails.26 Sep 2006
-
What is 'Trixie' and how do we remove it?
There are several tools that call themselves Trixie. Luckily, SearchSecurity.com's information security threats expert, Ed Skoudis, can tell the good from the bad and will help you rid your system ...26 Sep 2006
-
Nmap parsers and interfaces
SearchSecurity expert contributor Michael Cobb continues his series on Nmap with a detailed look at Nmap parsers and interfaces.26 Sep 2006
-
IT pros worried about unsecured devices
IT admins keep working to make networks secure even as more unsecured personal gadgets, like smart phones and BlackBerrys, find their way into companies.26 Sep 2006
-
Symantec Dark Vision app monitors underground IRC servers
The research project keeps tabs on the hacker underground, providing new insight on activities like credit card theft and spamming. Likely a compelling law-enforcement tool, for now the security gi...26 Sep 2006
-
How to reduce wireless driver security vulnerabilities
So, you have your up-to-date antivirus software with personal firewalls and antispam, antispyware and privacy control features. SearchSecurity.com's information security threats expert, Ed Skoudis,...26 Sep 2006
-
How can I prevent an FU rootkit from spreading throughout a network?
Information security threats expert, Ed Skoudis, explains the best way to stop an FU rootkit outbreak. Learn how to clean up your infected machine and prevent the malware from spreading across your...26 Sep 2006
Security Management Strategies for the CIO