February 2007 | Archive by Month | SearchSecurity.com | Page 5

February 2007

  • Coviello: In 3 years, no more stand-alone security

    RSA President Art Coviello says today's patchwork of monolithic security devices will disappear in the next three years as security is integrated into the larger IT infrastructure.

  • RSA Conference 2007: Product announcements

    RSA Conference 2007: Product announcements

  • The Daily Dose: Chris Wysopal blogs from RSA Conference 2007

    In his exclusive daily column from RSA Conference 2007, security pro Chris Wysopal comments on vulnerability disclosure, and says emerging Web application technologies present many new attack vecto...

  • Cyberwar: A threat to business

    In the dark crevices of the virtual world, malicious individuals and groups are at the ready, waiting for the perfect opportunity to target U.S. businesses where and when they least expect it. In t...

  • Symantec chief: Consumer confidence in data protection is key to online growth

    In his keynote at RSA Conference 2007, Symantec CEO John W. Thompson said Big Yellow is ready for the shifting dynamics in the information security market, and implied that Microsoft's growing pres...

  • Gates to outline Microsoft's new strategy for secure computing

    Bill Gates is back at RSA. At this year's conference, Gates plans to speak about the evolution of authentication, network policies and data protection, signaling a change in his vision of a "Digita...

  • Gates touts secure access anywhere

    Microsoft's chairman tells RSA Conference 2007 attendees that a combination of authentication and access management strategies is what it takes to protect corporate data, but information security p...

  • New zero-day attack targets Microsoft Excel

    Microsoft says maliciously crafted Excel files may permit the execution of arbitrary code. Other Microsoft Office applications may be at risk.

  • Going Wi-Fi? Go safely

    Today's security professionals are forced to balance the convenience that wireless technology offers with the need to enforce a solid security policy.

  • When physical and logical security converge

    For an enterprise to protect itself from a broad array of internal and external threats, more companies are considering security programs that forge closer ties between the physical and logical sec...

  • Keynoters speak volumes

    Times have changed, and RSA Conference keynote speakers no longer need cryptography and security backgrounds. This year's headliners include several rock stars of the IT industry, along with some n...

  • Vista exploitable, researcher says

    Marc Maiffret, CTO and chief hacking officer of eEye Digital Security, said he has found a way to elevate system privileges by exploiting a flaw in Windows Vista.

  • Microsoft has high hopes for Vista security

    Ben Fathi is the vice president of the Security Technology Unit at Microsoft and is responsible for the overall security of Microsoft's products as well as the development process known as the Secu...

  • Developing an application security mind-set

    Baking security into applications can be a difficult process, but experts believe developing an application security mind-set can help create more secure software systems.

  • Vendor alliance wants PCI certification program

    Debuting this week at RSA, the Payment Card Industry Security Vendor Alliance will provide guidance to the industry and hopes to ultimately get a PCI certification program off the ground.

  • RSA Conference 2007: Special news coverage

    Check out news, interviews, product announcements, podcasts and more live from the RSA Conference 2007 in San Francisco.

  • NAC gains traction

    Until recently, the network access control market had been all style and little substance, but at last vendors large and small are proving that NAC may be worth the investment.

  • WebSense: PortAuthority deal, Web 2.0 apps reflect changing threat landscape

    Websense's December acquisition of PortAuthority marries ingress and egress detection capabilities, giving the vendor a foothold in defending not only Web threats, but sensitive customer data and i...

  • CISOs mastering 'softer' skills

    This article examines why CISOs can no longer rely on technology skills alone and what businesses are looking for when recruiting their next information security leader.

  • Intrusion detection systems are alive and kicking

    IPS hasn't overtaken intrusion detection systems just yet. Senior News Writer Bill Brenner reveals what customers want when they're shopping for IDS products.