-
hybrid virus/worm
A hybrid virus/worm is malicious code that combines characteristics of both those types of malware, typically featuring the virus' ability to alter program code with the worm's ability to reside in...30 Oct 2008
-
HIDS/NIDS (host intrusion detection systems and network intrusion detection systems)
Host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) are methods of security management for computers and networks... (Continued)30 Oct 2008
-
data encryption/decryption IC
A data encryption/decryption IC is a specialized integrated circuit (IC) that can encrypt outgoing data and decrypt incoming data...30 Oct 2008
-
Is it possible to encrypt CDs and DVDs as well as SD cards?
Encryption is a necessary technology to keep today's enterprises secure, so it makes sense that companies would want to encrypt as much as possible. But are there products available to encrypt CDs,...30 Oct 2008
-
Adobe issues patch for critical PageMaker flaws
Flaws in Adobe PageMaker could allow a hacker to take control of an affected system.30 Oct 2008
-
Security survey finds increase in security standards adoption
Ernst & Young's 2008 Global Information Security Survey finds both positive and negative trends in information security depending on how you look at the numbers.30 Oct 2008
-
Metaforic crosses swords with software pirates
Company joins a number of vendors in the application hardening market with a technology that embeds protections in a program at compile time.29 Oct 2008
-
Security Squad: Security pros face troubles
The SearchSecurity editorial team discusses how the poor economy affects security pros, cybersecurity for the next president, vendor security transparency and the job market.28 Oct 2008
-
Options for a mechanical door security system on a server room door
After a server room door has been compromised, finding a more secure solution is of utmost importance. Learn how to choose a server room door that can secure your server without breaking the bank.28 Oct 2008
-
How will many firewalls serving as the default gateway affect the DMZ?
If you attempt to have multiple firewalls connected to the same network segment, all serving as the default gateway, routing problems will ensue. Network security expert Mike Chapple explains.28 Oct 2008
-
Screencast: How Tor improves Web surfing privacy and security audits
In an on-screen demonstration, learn how Tor can be used to ensure that surfing habits aren't recorded by malicious hackers.28 Oct 2008
-
How to create a (very) limited access directory on a network
Network security expert Mike Chapple explains the best way to create a limited access directory, without giving network administrators the "keys to the kingdom."28 Oct 2008
-
Security spending driven by mergers, Web 2.0 and compliance
PricewaterhouseCoopers' annual Global State of Information Security Survey found mergers, Web 2.0 and other business initiatives driving spending nearly as much as compliance.28 Oct 2008
-
Should tunnels be connected from an ISP to an internal data center?
A SearchSecurity.com reader needs to pass programs and data from an internal data center to an ISP data center through a secure tunnel. Mike Chapple tells him how to best initiate connections.28 Oct 2008
-
The top LAN security issues in a client-server network environment
In this SearchSecurity.com Q&A, network security expert Mike Chapple lays out four of the biggest LAN security threats.28 Oct 2008
-
Intrusion detection vs. intrusion prevention
Both IPS and IDS tools are designed to monitor the network for signs of unusual activity. Network security expert Mike Chapple explain how each technology differs in its approach.28 Oct 2008
-
What is the GISP certification and how does it compare to the CISSP certification?
In the world of security certifications, what is the GISP and how alike is it to the CISSP? In this security management expert response, learn about scenarios when the GISP might be appropriate and...27 Oct 2008
-
FISMA compliance made easier with OpenFISMA
Scott Sidel examines the open source security tool OpenFISMA, a compliance tool that assists government agencies and their contractors in meeting FISMA's requirements.27 Oct 2008
-
Sophos sees increase in malicious email attachments
Spam using malicious attachments and social engineering techniques are targeting computer users in rising numbers, according to security vendor Sophos.27 Oct 2008
-
Can mutual authentication beat phishing or man-in-the-middle attacks?
What's the best way to prevent phishing and man-in-the-middle attacks? IAM expert David Griffeth explains the benefits of mutual authentication over one-way SSL.24 Oct 2008
Security Management Strategies for the CIO