June 2007

  • Do certifications have credibility?

    Certifications can be one way to evaluate security consultants, but as Information Security's Marcia Savage reports, opinions vary as to their value.

  • Encryption key management blunders can render deployments useless

    Encryption sounds like an ideal way to protect data but key management, including accountability, training, and enforcement of password complexity, are challenging.

  • Product review: Identity Engines' Ignition Server

    Identity Engines' Ignition Server manages access controls across disparate directory services platforms (Active Directory, LDAP, eDirectory) by consolidating them into a single user store.

  • Product review: eEye Digital Security's Blink Professional 3.0

    eEye Digital Security's Blink Professional 3.0 is a host-based multi-layered threat mitigation and intrusion prevention product for protecting Windows computers. This product reviews evalutes the s...

  • Who's fighting the spyware operators?

    There are plenty of malicious hackers who use spyware to gather others' personal data, so why aren't these cybercriminals behind bars? In this SearchSecurity.com Q&A, Ed Skoudis explains some of th...

  • Can network behavior anomaly detection (NBAD) products stop rootkits?

    There are plenty of network-based products that use packet and connection rates to detect rootkits and other malware. In this SearchSecurity.com Q&A, information security threats expert Ed Skoudis ...

  • Should a rise in text message spam be expected?

    According to a Ferris Research study, consumers this year are expected to receive a total of about 1 billion cell phone spam messages. Yet, compared to other countries, text message spam hasn't hit...

  • Creating a personal digital certificate

    In this SearchSecurity.com expert Q&A, identity management and access control pro Joel Dubin discusses the pros and cons associated with creating a personal digital certificate.

  • What is a logic bomb?

    A logic bomb is a dangerous piece of software designed to damage a computer or network and cause massive data destruction. In this SearchSecurity.com Q&A, Ed Skoudis explains how an enterprise can ...