-
The risks of disabling User Account Control (UAC) on Windows Vista
It may upgrade the user experience to disabe the User Account Control (UAC) feature, but there are some serious security risks. Application security expert Michael Cobb gives advice.30 Jun 2008
-
Pre-requisites for implementing enterprise single sign-on (SSO)
Implementing single sign-on (SSO) in an enterprise involves many security considerations, and there are no universal protocals. Identity access management expert Joel Dubin gives his advice on impl...30 Jun 2008
-
How can we convince our VP that a network-based DLP makes sense?
Pitching data leak prevention security technology to a vice president can be tricky, but security management expert Mike Rothman gives tips on how to get funding without creating unrealistic expect...30 Jun 2008
-
PCI Requirement 6.6 has merchants gearing up
Large organizations opt for Web application firewalls, smaller companies lean toward code reviews.30 Jun 2008
-
Software still plagued with security holes, researcher says
In this podcast, noted security researcher Greg Hoglund, who specializes in Windows rootkits and secure coding, explains why software is just as vulnerable today as it was in 1999.30 Jun 2008
-
Startup Symplified delivers SSO in the cloud
Mid-sized enterprises lack the money and expertise to implement identity management for Web-based services. Startup Symplified is banking on the software-as-a-service (SaaS) model as a solution.26 Jun 2008
-
asymmetric cryptography (public-key cryptography)
Asymmetric cryptography is cryptography in which a pair of keys is used to encrypt and decrypt a message so that it arrives securely. Initially, a network user requests a public and private key pa...25 Jun 2008
-
Cisco warns of UCM flaws
Updates are available to fix DoS and authentication bypass vulnerabilities in Cisco UCM.25 Jun 2008
-
Next wave of security will be defined by metrics, analysts say
Not enough security pros are tracking the successes of their security programs and properly articulating their value to senior level management.25 Jun 2008
-
Is introducing Wi-Fi to airplanes is a good idea security-wise?
Wi-Fi on airplanes seems like it will be unavoidable in the future, but what security risks does it pose? In this security threats expert response, learn what airplane Wi-Fi might mean for security...25 Jun 2008
-
Microsoft tools won't be quick fix for SQL injection attacks
Microsoft's security advisory will help raise awareness about secure software coding, but it won't stop the onslaught of SQL injection attacks, experts say.25 Jun 2008
-
Database patch denial: How 'critical' are Oracle's CPUs?
A recent survey found that a considerable number of users are outright rejecting Oracle's Critical Patch Updates, perhaps suggesting database administrators feel comfortable with their security def...25 Jun 2008
-
Screencast: Recovering lost data with WinHex
WinHex is a forensics tool that allows users to examine running programs, wipe confidential files or unused space, and perform drive imaging and drive cloning. In this secreencast Peter Giannoulis ...24 Jun 2008
-
Researchers defend study on patch distribution insecurities
A team of security researchers warn that a patch-based exploit generation technique could be easily carried out by an attacker.24 Jun 2008
-
Microsoft identifies tools to address SQL injection attacks
On the heels of a tidal wave of SQL injection attacks in recent months, Microsoft issued an advisory to identify tools that could help stave off the attacks.24 Jun 2008
-
password hardening
Password hardening is any one of a variety of measures taken to make it more difficult for an intruder to circumvent the authentication process. Password hardening may take the form of multifacto...23 Jun 2008
-
Symantec launches Endpoint Management Suite
Symantec integrated its acquisition of Altiris with the release of Endpoint Management Suite 1.0.23 Jun 2008
-
How can a Certified Ethical Hacker become a line penetration tester?
When making the career move from Certified Ethical Hacker to a line penetration tester, what is the first step? Security management expert Mike Rothman gives his advice.19 Jun 2008
-
Could managed security services cause data woes?
In this podcast, SearchSecurity.com editors discuss managed security services, the increase of SQL injection attacks and whether secure software coding is improving.19 Jun 2008
-
keystroke dynamics
Keystroke dynamics are the patterns of rhythm and timing created when a person types...(Continued)18 Jun 2008
Security Management Strategies for the CIO