February 2007

  • Gates to outline Microsoft's new strategy for secure computing

    Bill Gates is back at RSA. At this year's conference, Gates plans to speak about the evolution of authentication, network policies and data protection, signaling a change in his vision of a "Digita...

  • RSA Conference 2007: Product announcements

    RSA Conference 2007: Product announcements

  • VA searches for missing external hard drive

    The FBI is investigating the possible theft of a U.S. Department of Veterans Affairs hard drive containing personal data on nearly 50,000 veterans.

  • CA backup bug exploitable on Vista

    In what appears to be the first exploit for a third-party app running on Vista, a previously patched buffer overflow vulnerability in CA BrightStor ARCserve Backup has been exploited. One security ...

  • Cryptographer's Panel: Founding fathers still eager for new advances

    On the eve of cryptography's 30th anniversary, the men who invented the field say they're proud of what's been accomplished, but new cryptosystems are needed to keep on top of emerging threats.

  • Coviello: In 3 years, no more stand-alone security

    RSA President Art Coviello says today's patchwork of monolithic security devices will disappear in the next three years as security is integrated into the larger IT infrastructure.

  • The Daily Dose: Chris Wysopal blogs from RSA Conference 2007

    In his exclusive daily column from RSA Conference 2007, security pro Chris Wysopal comments on vulnerability disclosure, and says emerging Web application technologies present many new attack vecto...

  • RSA Conference 2007: Special news coverage

    Check out news, interviews, product announcements, podcasts and more live from the RSA Conference 2007 in San Francisco.

  • Microsoft has high hopes for Vista security

    Ben Fathi is the vice president of the Security Technology Unit at Microsoft and is responsible for the overall security of Microsoft's products as well as the development process known as the Secu...

  • A new awareness for SIMs

    Experts say the use of security information and event management systems can not only give organizations overall visibility into their network security and improve their incident response, but also...

  • WebSense: PortAuthority deal, Web 2.0 apps reflect changing threat landscape

    Websense's December acquisition of PortAuthority marries ingress and egress detection capabilities, giving the vendor a foothold in defending not only Web threats, but sensitive customer data and i...

  • Dozens of Web sites spread malicious Trojan

    Update: The same malicious JavaScript keylogger that compromised the Dolphin Stadium Web site last week was found over the weekend on dozens of other high-profile Web sites.

  • New zero-day attack targets Microsoft Excel

    Microsoft says maliciously crafted Excel files may permit the execution of arbitrary code. Other Microsoft Office applications may be at risk.

  • When physical and logical security converge

    For an enterprise to protect itself from a broad array of internal and external threats, more companies are considering security programs that forge closer ties between the physical and logical sec...

  • Intrusion detection systems are alive and kicking

    IPS hasn't overtaken intrusion detection systems just yet. Senior News Writer Bill Brenner reveals what customers want when they're shopping for IDS products.

  • CISOs mastering 'softer' skills

    This article examines why CISOs can no longer rely on technology skills alone and what businesses are looking for when recruiting their next information security leader.

  • Pitfalls aplenty going SOA

    Service-oriented architectures may improve the standardization and efficiency of your business -- often at the expense of security. Michael S. Mimoso investigates the security features that vendors...

  • VeriSign touts benefits of Extended Validation SSL Certificates

    VeriSign and other certificate authorities (CAs) have been at the forefront of Extended Validation SSL Certificates (formerly known as high-assurance certificates), which standardize the vetting pr...

  • Vendor alliance wants PCI certification program

    Debuting this week at RSA, the Payment Card Industry Security Vendor Alliance will provide guidance to the industry and hopes to ultimately get a PCI certification program off the ground.

  • Keynoters speak volumes

    Times have changed, and RSA Conference keynote speakers no longer need cryptography and security backgrounds. This year's headliners include several rock stars of the IT industry, along with some n...