• February 06, 2007 06 Feb'07

    The Daily Dose: Chris Wysopal blogs from RSA Conference 2007

    In his exclusive daily column from RSA Conference 2007, security pro Chris Wysopal comments on vulnerability disclosure, and says emerging Web application technologies present many new attack vectors that have yet to be discovered.  Continue Reading

  • February 06, 2007 06 Feb'07

    CA backup bug exploitable on Vista

    In what appears to be the first exploit for a third-party app running on Vista, a previously patched buffer overflow vulnerability in CA BrightStor ARCserve Backup has been exploited. One security firm says ISVs aren't taking advantage of Vista's ...  Continue Reading

  • February 06, 2007 06 Feb'07

    Cryptographer's Panel: Founding fathers still eager for new advances

    On the eve of cryptography's 30th anniversary, the men who invented the field say they're proud of what's been accomplished, but new cryptosystems are needed to keep on top of emerging threats.  Continue Reading

  • February 06, 2007 06 Feb'07

    Symantec chief: Consumer confidence in data protection is key to online growth

    In his keynote at RSA Conference 2007, Symantec CEO John W. Thompson said Big Yellow is ready for the shifting dynamics in the information security market, and implied that Microsoft's growing presence in security is a conflict of interest for its ...  Continue Reading

  • February 06, 2007 06 Feb'07

    Cyberwar: A threat to business

    In the dark crevices of the virtual world, malicious individuals and groups are at the ready, waiting for the perfect opportunity to target U.S. businesses where and when they least expect it. In this tip, contributor Gideon T. Rasmussen profiles ...  Continue Reading

  • February 05, 2007 05 Feb'07

    A new awareness for SIMs

    Experts say the use of security information and event management systems can not only give organizations overall visibility into their network security and improve their incident response, but also meet compliance demands.  Continue Reading

  • February 05, 2007 05 Feb'07

    NAC gains traction

    Until recently, the network access control market had been all style and little substance, but at last vendors large and small are proving that NAC may be worth the investment.  Continue Reading

  • February 05, 2007 05 Feb'07

    VeriSign touts benefits of Extended Validation SSL Certificates

    VeriSign and other certificate authorities (CAs) have been at the forefront of Extended Validation SSL Certificates (formerly known as high-assurance certificates), which standardize the vetting process used by CAs against certificate buyers, and ...  Continue Reading

  • February 05, 2007 05 Feb'07

    Intrusion detection systems are alive and kicking

    IPS hasn't overtaken intrusion detection systems just yet. Senior News Writer Bill Brenner reveals what customers want when they're shopping for IDS products.  Continue Reading

  • February 05, 2007 05 Feb'07

    Pitfalls aplenty going SOA

    Service-oriented architectures may improve the standardization and efficiency of your business -- often at the expense of security. Michael S. Mimoso investigates the security features that vendors are adding to their Web services and SOA products.  Continue Reading

  • February 05, 2007 05 Feb'07

    When physical and logical security converge

    For an enterprise to protect itself from a broad array of internal and external threats, more companies are considering security programs that forge closer ties between the physical and logical security realms. Billy Hurley explains what's holding ...  Continue Reading

  • February 05, 2007 05 Feb'07

    CISOs mastering 'softer' skills

    This article examines why CISOs can no longer rely on technology skills alone and what businesses are looking for when recruiting their next information security leader.  Continue Reading

  • February 05, 2007 05 Feb'07

    WebSense: PortAuthority deal, Web 2.0 apps reflect changing threat landscape

    Websense's December acquisition of PortAuthority marries ingress and egress detection capabilities, giving the vendor a foothold in defending not only Web threats, but sensitive customer data and intellectual property leaving the network perimeter. ...  Continue Reading

  • February 05, 2007 05 Feb'07

    Going Wi-Fi? Go safely

    Today's security professionals are forced to balance the convenience that wireless technology offers with the need to enforce a solid security policy.  Continue Reading

  • February 05, 2007 05 Feb'07

    Integration migration

    Today John Swainson, president and chief executive officer of CA, will be making his first keynote speech at an RSA conference. Since joining CA in 2004, John has focused the company on its core strengths of systems, network, security and storage ...  Continue Reading

  • February 05, 2007 05 Feb'07

    Vista exploitable, researcher says

    Marc Maiffret, CTO and chief hacking officer of eEye Digital Security, said he has found a way to elevate system privileges by exploiting a flaw in Windows Vista.  Continue Reading

  • February 05, 2007 05 Feb'07

    Keynoters speak volumes

    Times have changed, and RSA Conference keynote speakers no longer need cryptography and security backgrounds. This year's headliners include several rock stars of the IT industry, along with some newcomers and several old veterans.  Continue Reading