-
Cisco fixes Unified CallManager, Unified Presence Server flaws
Also: Microsoft warns of a new Windows zero-day threat and investigates a reported flaw in Vista.30 Mar 2007
-
PING with Shelley Barnes
As vice president of technology and process at Arizona Tile, Shelley Barnes does not have a CSO to rely on. Barnes has to make the most of the SMB's resources to handle security.30 Mar 2007
-
Spam poses as Internet Explorer 7 download
Beware of emails from "admin@microsoft.com." It may look like an invitation to download Internet Explorer 7, but it's really a trick to infect machines with malware.30 Mar 2007
-
New SANS program a critical leap forward
The SANS Institute's newest training program will address a critical need for more security-minded code writers and shows how far the industry has come.29 Mar 2007
-
What are the best ways to block proxy server sites?
Proxy services allow employees to view unauthorized content, but the proxies themselves and the sites that list them are tricky to detect. In this SearchSecurity.com Q&A, learn how some content mon...29 Mar 2007
-
Can content management tools customize access request forms?
Still using a paper system for access requests? In this SearchSecurity.com Q&A, identity management and access control expert Joel Dubin explains which content management tools can customize your W...29 Mar 2007
-
IT pros give new antispyware guidelines a mixed review
The Anti-Spyware Coalition's "best practices" documents will aid the spyware fight, IT pros say. But some wanted a better threat-rating system and more of the corporate IT viewpoint.29 Mar 2007
-
FMC promises new business opportunities, security headaches
Fixed-mobile convergence (FMC) will help enterprises save money and boost productivity. First, though, they'll have to address security issues on an unprecedented scale.29 Mar 2007
-
Will data breach be the end of TJX?
This week in Security Blog Log: Industry experts say companies can learn from a data breach and even prosper from it. But is TJX following the right example?29 Mar 2007
-
Microsoft warns of Windows zero-day; third-party fix released
Attackers are exploiting a new zero-day flaw in Windows, Microsoft confirmed Thursday. eEye Digital Security has released a temporary patch.29 Mar 2007
-
TJX says at least 45.7 million card numbers stolen
An analyst says the 45.7 million-plus card numbers stolen in the TJX data breach marks the biggest online heist in history.29 Mar 2007
-
Will the costliness of PKI architectures prevent their growth?
Implementing a public key infrastructure takes time and money, leaving some wondering if PKI technologies will continue to grow. In this SearchSecurity.com Q&A, identity management and access cont...28 Mar 2007
-
Exploit code out for Internet Explorer flaw
Websense Security Labs warned that exploit code targeting the Internet Explorer MDAC flaw has been published. Microsoft released a patch for the flaw in February.28 Mar 2007
-
How to implement IIS authentication settings
In this SearchSecurity.com Q&A, identity management and access control expert Joel Dubin reviews how to set IIS authentication permissions and allow open access to Web sites hosted on the server.28 Mar 2007
-
IT pros eye Windows Server 2003 SP2 with caution
Despite its security and stability enhancements, IT pros say they are in no rush to deploy Windows Server 2003 SP2, which arrived with little warning two weeks ago.28 Mar 2007
-
single-factor authentication (SFA)
Single-factor authentication (SFA) is the traditional security process that requires a user name and password before granting access to the user... (Continued)27 Mar 2007
-
Metasploit Framework 3.0 released
Brief: Metasploit Framework 3.0 contains 177 exploits, 104 payloads, 17 encoders and 30 auxiliary modules that perform such tasks as host discovery and protocol fuzzing.27 Mar 2007
-
SANS: New exam program about more secure code
The SANS Institute has unveiled a skills assessment and certification exam program designed to test the secure coding skills of software programmers.27 Mar 2007
-
What is the harm in removing a credit card's RFID chip?
If you're concerned that a credit card's RFID chip is putting your personal data at risk, why not just drill the darn thing out? Not so fast, says Joel Dubin. In this SearchSecurity.com Q&A, the i...27 Mar 2007
-
How to ensure that an SSL connection protects sensitive Web data
In this expert Q&A, application security pro Michael Cobb explains how to secure sensitive Web site data that is sent across the Internet.26 Mar 2007
Security Management Strategies for the CIO