-
IT pros mixed on merits of Windows attack code
Immunity Inc. says it released attack code for the Windows TCP/IP flaw so enterprises could pinpoint their risk. But some IT administrators worry about the wrong people using it.31 Jan 2008
-
Societe Generale: A cautionary tale of insider threats
The $7.2 billion in fraud against French banking giant Societe Generale wasn't your garden variety cyber attack, but it illustrates an insider threat that gives IT pros nightmares.31 Jan 2008
-
How are the PCI DSS deadline extensions affecting corporations' desire to become compliant?
Becoming PCI DSS compliant is hard work for financial institutions, but will deadline extensions help?31 Jan 2008
-
Security measures pose risk of government control of cyberspace
Legislators say the Patriot Act and the Protect America Act protect the country from terrorists, but those and other measures ultimately put the government and a few corporations in control of the Internet,...31 Jan 2008
-
Quiz: Building a risk-based compliance program
A five-question multiple-choice quiz to test your understanding of Richard Mackey's Compliance School lesson.30 Jan 2008
-
talking Trojan
A talking Trojan is a Trojan horse program that mocks the user of an infected PC with a repeating audio message while it deletes the entire contents of a hard drive. The first outbreak of the talki...29 Jan 2008
-
Barracuda enlists open source help in Trend Micro patent fight
Barracuda Networks is looking for works of prior art in hopes of beating back patent infringement charges levied by Trend Micro with the U.S. government.29 Jan 2008
-
Former @stake researchers rekindle past, discuss Symantec spin-off
Dennis Fisher talks to early members of @stake about its history, culture and the company's continued influence on the security industry.29 Jan 2008
-
What are the roles of a liaison officer?
Security incident response is one of the main duties of a liaison officer. Security management expert Mike Rothman explains.29 Jan 2008
-
A security checklist: How to build a solid DMZ
As part of his monthly response to readers, Mike Chapple provides a list of security add-ons that no DMZ should be without.28 Jan 2008
-
Open source vs. commercial network access control (NAC) products
There are now a number of free and open source network access control (NAC) products, but how do they stack up against the commercial options? Network professional Mike Chapple reviews the free alt...28 Jan 2008
-
What to consider before opening a port
Recently, a reader asked network expert Mike Chapple, "What would be the security implications of opening six ports through a firewall?" Chapple reviews what questions need to be addressed before a...28 Jan 2008
-
Quiz: Developing a risk-based compliance program
A five-question multiple-choice quiz to test your understanding of the content presented by expert Richard Mackey in this lesson of SearchSecurity.com's Compliance School.28 Jan 2008
-
Researcher warns of new do-it-yourself phishing program
FaceTime malware research director Chris Boyd says his team has been trying with mixed results to take down a new do-it-yourself phishing program they found online.28 Jan 2008
-
PDF spam reemerges in some inboxes
One vendor is reporting the discovery of a small amount of PDF spam reemerging since it almost completely disappeared in August.28 Jan 2008
-
The road from network administrator to information security professional
Recently, a young network administrator told Mike Chapple, "I really want to channel my efforts to become an information security professional. What steps do you recommend?" Chapple explains the ty...28 Jan 2008
-
How to apply ISO 27002 to PCI DSS compliance
The Payment Card Industry Data Security Standard may be fairly straightforward, but it's lacking in defining the processes that will ultimately lead to PCI DSS compliance. In this tip, expert Richa...28 Jan 2008
-
Why are there still various independent credit card security standards?
PCI DSS has become the well-known information security standard for credit cards, but vendors can still have different approaches to card data security.25 Jan 2008
-
How to prevent hack attacks against smart card systems.
What are smart cards, and how can the security of a smart card itself be maintained?25 Jan 2008
-
NAC vendors stake future on manageability
With security experts predicting a shake-out in the NAC market, vendors are focusing on management tools as the best recipe for survival.24 Jan 2008
Security Management Strategies for the CIO