-
Security visualization helps make log files work
Using visualization tools, security pros can build charts and graphs to make sense of complex log files and data and improve their company's security stance.28 Aug 2008
-
CISSP Essentials Lesson 1: Security management practices
In this CISSP lesson, learn about security management practices.28 Aug 2008
-
What warning signs will indicate the presence of a P2P botnet?
Expert Mike Chapple explains two easy ways to detect the presence of a P2P botnet on your system.27 Aug 2008
-
Using batch files for temporary user access to the local admin group
When a program that many users need to access requires local admin rights to run, what's the best way to manage user privileges? IAM expert Joel Dubin weighs in on how best to manage user accounts.27 Aug 2008
-
Linux systems actively targeted using SSH key attacks
Attackers install a rootkit on the compromised systems to steal more SSH keys.27 Aug 2008
-
The Little Black Book of Computer Security, 2nd Edition
In an online excerpt of The Little Black Book of Computer Security, expert author Joel Dubin reviews how to prepare for today's most important compliance requirements.27 Aug 2008
-
Can an IDS, DMZ and honeypot together achieve better network security?
An IDS and DMZ can be used together to achieve better network security, but expert Mike Chapple explains which tool is too risky to add to the mix.26 Aug 2008
-
Screencast: How to use Wikto for Web server assessment
Peter Giannoulis demonstrates what kinds of website and Web server information can be found using the free Wikto tool.26 Aug 2008
-
Data breach discovery, disclosure outpaces 2007
More data breaches have been reported so far this year than in all of 2007, according to a report released by a nonprofit group that works to prevent fraud.26 Aug 2008
-
What does the future of the endpoint encryption market look like?
Full-disk encryption may be a must-have, but where is the endpoint encryption market headed? Security management expert Mike Rothman looks at recent mergers to predict what the future may hold.25 Aug 2008
-
Differences between an SAS 70 data center and a Tier III data center
Learn what the difference is between an SAS 70 data center and a Tier III data center and the strengths and weaknesses of each in this response from security management expert Mike Rothman.25 Aug 2008
-
Plug-in opens door for self-signed SSL certs in Firefox 3
Perspectives, a system developed by researchers at Carnegie Mellon University authenticates self-signed certificates and bypasses confusing security pop-ups displayed in Firefox 3.22 Aug 2008
-
How to avoid DLP implementation pitfalls
Data leak prevention tools effectively reduce the chances that an enterprise's sensitive data will end up where it shouldn't, but several pitfalls can severely curtail a DLP tool's effectiveness. I...21 Aug 2008
-
Quiz: Data loss prevention
Take this five-question quiz to test your knowledge of Rich Mogull's data loss prevention material.21 Aug 2008
-
PCI groups to focus on wireless, pre-authorization changes
The PCI Security Standards Council has started two special interest groups to focus on pre-authorization and wireless security issues.21 Aug 2008
-
Are independent researchers out for fame?
According to a recent X-Force report, it seems some independent researchers may be more interested in fame than exposing security risks. But how accurate is this assessment? Security management exp...21 Aug 2008
-
Researcher disinfects multimedia Trojans
Security researcher developed a tool to cure infected Windows Media audio and video files with GetCodec Trojans, a form of media based malware.20 Aug 2008
-
Adobe investigates clipboard hijackings
Web surfers are running into a new attack that hijacks clipboards and inserts a link to a site selling a fake antimalware program.20 Aug 2008
-
What reporting tools are available for an enterprise IDS?
Modern security analysts can easily become overwhelmed by the variety and quantity of audit records. In this SearchSecurity.com Q&A, network expert Mike Chapple reveals which open-source reporting ...20 Aug 2008
-
PCI DSS 1.2 clarifies wireless, antivirus use
Version 1.2 of PCI DSS, due out in October, requires 802.1x for wireless protection and antivirus for all operating systems, according to a summary of the changes issued Tuesday.19 Aug 2008
Security Management Strategies for the CIO