-
Year of non-stop consolidation in information security market
Consolidation continued at a rapid clip with the data loss prevention and Web application security markets seeing the most activity27 Dec 2007
-
Will one failed drive corrupt the rest of a RAID-5 array?
In this expert Q&A, Michael Cobb explains when it is appropriate to keep a RAID-5 array's failed drive online.26 Dec 2007
-
Should CS2 applications be downloaded to a removable drive?
Even though U3 smart drives can execute Windows-based applications directly, the devices can introduce security risks into the enterprise. Michael Cobb lays out the pros and cons of the technology.26 Dec 2007
-
What is the relationship between shellcode and exploit code?
Is shellcode always considered exploit code? In this expert response, Michael Cobb breaks down the two malware terms.26 Dec 2007
-
What security issues can arise from unsynchronized system clocks?
Network administrators don't always pay enough attention to the issues of system clock accuracy and time synchronization. Michael Cobb explains why that can lead to security problems.26 Dec 2007
-
For data minders, 2007 was a year of living dangerously
As the number of compromised records pushed past 217 million, experts spoke less about preventing a data breach and more about responding properly after discovering one.26 Dec 2007
-
What precautions should be taken if biometric data is compromised?
In this Q&A, Joel Dubin discusses what precautions to take if corporate biometric data is stolen.21 Dec 2007
-
Using Nagios network monitoring to stay on top of network problems
Contributor Scott Sidel discusses Nagios, an open source security tool designed for system and network monitoring through a variety of checks and status alerts.20 Dec 2007
-
Is it against HIPAA regulations to display client names?
Security management expert Mike Rothman discusses the terms of HIPAA, specifically if it is a violation of the act to publicly display client names.20 Dec 2007
-
Are there security management products that can track compliance objectives?
Mike Rothman discusses the products available for tracking your corporation's compliance objectives.20 Dec 2007
-
Virus spreads on Google's Orkut network
Google is addressing a virus spreading on its social network and a new Trojan hijacking Google text advertisements.20 Dec 2007
-
Getting started on a career in penetration testing
In this expert response, Mike Rothman offers insight on how to start a career in penetration testing.20 Dec 2007
-
IE patch glitch sends admins in search of workarounds
Microsoft announced a workaround for IT shops affected by a flawed Internet Explorer (IE) security patch, but some administrators sought the solution on their own.20 Dec 2007
-
Storm, Nugache lead dangerous new botnet barrage
A new breed of malicious software is spreading on the Web. It's engineered to change on the fly, adapt to its environment and evade traditional defenses.19 Dec 2007
-
Can threat modeling help enterprises?
In this expert response, Ed Skoudis explains how threat modeling can determine an organization's greatest threats and associated risks.19 Dec 2007
-
Critical security patch for Adobe Flash Player
Adobe Systems Inc. has patched multiple Adobe Flash Player flaws attackers could exploit to hijack computers and cause a variety of damage.19 Dec 2007
-
What is Spycar?
Spycar, still available for free, tests a machine against 17 daggressive spyware-like behaviors. Information security threat expert Ed Skoudis explains the tool and gives a preview of Spycar 2.19 Dec 2007
-
Lessons learned from TJX: Best practices for enterprise wireless encryption
The TJX data breach revealed all too well the weaknesses of the Wired Equivalent Privacy security model. The retailer's well-documented compromise of more than 94 million credit card numbers prove...19 Dec 2007
-
How to prevent hackers from accessing your router security password
In this Q&A, Joel Dubin unveils the best practices for protecting a router security password from compromise.19 Dec 2007
-
How can copying file and exchanging memory tokens spread malware?
Ed Skoudis explains the malware-related risks of copying files, exchanging memory sticks and downloading emails.19 Dec 2007
Security Management Strategies for the CIO