-
Security skills pay increases despite economic downturn
Despite the dour economy, new skills pay data suggests security managers are benefiting as CIOs look to retrench to survive the tough times ahead.29 Jan 2009
-
Sensitive data insecure abroad, McAfee report finds
Sensitive customer information and intellectual property is at high risk, especially in developing nations, according to a new survey.29 Jan 2009
-
VA could pay veterans $20 million for security breach
Under terms of a proposed settlement, the VA admits no wrongdoing in the theft of a stolen laptop containing the personal information of millions of veterans.29 Jan 2009
-
Employee information security awareness training for new IAM systems
When an enterprise gets new IAM systems, training employees on how to interact with the technology is one of the most important aspects of deployment. Learn how to implement employee information se...29 Jan 2009
-
Microsoft Conficker worm hits peak, but payload awaits
Security researchers are fascinated by the spreading Conficker/Downadup worm, but are unsure what kind of damage it will do to corporate networks.28 Jan 2009
-
How to preserve an IT security budget from data breach fines
After a data breach, it's important to re-build security quickly and well, but when breach fines are exacted from a security team, it can cripple improvement efforts. Learn how to preserve an IT se...28 Jan 2009
-
How to prevent SSH brute force attacks
Brute force attacks on the Secure Shell (SSH) service have been used more frequently to compromise accounts and passwords. Expert John Strand explains how to defend against these brute-force threats.28 Jan 2009
-
Symantec CEO Thompson could be next commerce chief
Symantec CEO John Thompson, who is slated to step down from the position in March, is reportedly the top choice for Secretary of Commerce.28 Jan 2009
-
First lawsuit filed in Heartland data security breach
A class action lawsuit was filed against Heartland claiming that the payment processor issued belated and inaccurate statements when it announced a security breach of its systems.28 Jan 2009
-
Will Google Chrome enhance overall browser security?
Expert John Strand reviews Google Chrome's browser security features and what the new tool will mean for enterprise IT teams.28 Jan 2009
-
How can 419 scam emails and backscatter spam be stopped?
A 419 scam is just one example of backscatter spam. John Strand explains which long-term solutions can help combat these particular kinds of unwanted messages.28 Jan 2009
-
Security book chapter: Applied Security Visualization
In this section of Chapter 5: Visual Security Analysis (.pdf), author Raffael Marty discovers the forensic analysis of log data for discovering attacks and reporting incidents.28 Jan 2009
-
Archer Technologies buys IT GRC competitor Brabeion Software
Archer's acquisition of Brabeion indicates convergence in the IT GRC market. Compliance and trend to risk management bode well for GRC companies' in wake of economic meltdown.27 Jan 2009
-
How to secure a website containing badware (banner82)
In an expert Q&A, John Strand reviews how SQL injection attacks can lead to banner82 attacks and a "badware" label for your website.27 Jan 2009
-
How to use Nmap to scan a network
Peter Giannoulis takes a look at everybody's favorite, freely available port scanner and OS identifier: Nmap.27 Jan 2009
-
Educators see secure coding training challenges, improvements
University-level secure coding training is improving, but hurdles remain, professors say.27 Jan 2009
-
Websense acquires Web 2.0 antispam platform Defensio
Web, DLP and email security vendor Websense improves ThreatSeeker Network intelligence with Defensio social media protection service.27 Jan 2009
-
Barracuda Networks expands backup service with acquisition
The acquisition of Yosemite Technologies adds support for Microsoft Exchange, SQL-Server and Windows state backup.27 Jan 2009
-
Screencast: How to scan with Nmap
Peter Giannoulis takes a look at everybody's favorite, freely available port scanner and OS identifier: Nmap.27 Jan 2009
-
How can mobile device data be lost on a peer-to-peer (P2P) network?
Peer-to-peer telephone services, such as Skype, Free World Dialup (FWD) and Ooma, offer users a way to save significant money on telephone services. But how well do they protect your data?26 Jan 2009
Security Management Strategies for the CIO