-
Information security podcasts: 2009 archive
Listen to all of SearchSecurity.com's security podcasts from 2009: a collection of the year's best IT news and Q&A with infosec experts.31 Dec 2009
-
Hacker pleads guilty to orchestrating Heartland credit card heist
Albert Gonzalez plead guilty to hacking into computer networks and stealing tens of millions of credit and debit cards from retailers and financial firms.30 Dec 2009
-
GSM cell phone encryption crack may force operators to upgrade
Karsten Nohl, a widely known encryption expert, has cracked the GSM encryption algorithm and claims software is available for hackers to eavesdrop on calls.29 Dec 2009
-
How to advance in your information career in the current economic storm
It's not news that the current economy is struggling, but what's the best way for infosec pros to position themselves to make it through? Sara Santarelli, Chief Network Security Officer of Verizon,...28 Dec 2009
-
Microsoft doesn't rule out rushed patch for IIS zero-day vulnerability
Software giant dismisses the critical nature of the Internet Information Services zero-day flaw, but doesn't rule out an out-of-band patch.28 Dec 2009
-
Security risk management video: Business partner security and pandemic planning
In this exclusive interview, Sara Santarelli gives tips on how to deal with the risks posed by business partners and possible pandemics, and how to assess your enterprise's exposure to these risks.28 Dec 2009
-
DDoS attack strikes UltraDNS, affects Amazon, Wal-Mart
A flood of traffic caused general sluggishness and some outages an hour late Wednesday.24 Dec 2009
-
Twitter domain hijacking highlights DNS security weaknesses
While some security experts call the Twitter incident a non-issue, others say it is a reminder of DNS weaknesses and the need for better authentication.24 Dec 2009
-
What are the top three network intrusion techniques?
Nick Lewis reviews the top three technologies used by hackers to cover their tracks after a network intrusion.23 Dec 2009
-
How to prevent rogue antivirus programs in the enterprise
Rogue antivirus programs have preyed on users' fears for several years now, and their presence has increased. Learn how to keep them out of the enterprise.23 Dec 2009
-
How to stop keylogging malware with more than basic antivirus software, firewalls
Nick Lewis reviews two main desktop-oriented defenses that could be used to stop more sophisticated code like keylogging malware.23 Dec 2009
-
How do passwordless SSH keys represent an enterprise attack vector?
Passwordless SSH keys represent an attack vector because their safety is determined by the security of the host. Learn how to protect communication between two networked devices.23 Dec 2009
-
Security industry praises Schmidt but sees challenges ahead
President Obama's choice for cybersecurity coordinator is being widely praised, but experts say he has major hurdles to overcome.22 Dec 2009
-
Choosing the right authentication method for your business
These days, there are so many different authentication options for so many varied devices that it's hard to know what to choose. In this video, Mark Diodati of Burton Group explains what's new in t...22 Dec 2009
-
PuTTY configuration tips: How to connect to remote network systems
Peter Giannoulis reviews PuTTY and explains how to use the Windows-based program as an SSH, telnet and rlogin client.22 Dec 2009
-
Disaster recovery and business continuity tabletop exercises
When disaster strikes, will your enterprise be ready? In this security management expert response, David Mortman explains what questions to ask during disaster recovery and business continuity tabl...21 Dec 2009
-
PKI vulnerabilities: How to update PKI with secure hash functions
Learn how to prevent PKI vulnerabilities recently announced by Dan Kaminsky from being exploited at your enterprise with advice from IAM expert Randall Gamby.21 Dec 2009
-
Adobe warns of critical Flash Media Server vulnerability
Adobe issues update correcting two critical flaws in Flash Media Server 3.5.2 and earlier versions.21 Dec 2009
-
Howard Schmidt named cybersecurity coordinator
Former Bush administration cybersecurity advisor Howard Schmidt is expected to be named cybersecurity coordinator.21 Dec 2009
-
Conficker-infected machines now number 7 million, Shadowserver finds
Despite inactivity, the number of bots created by the fast spreading Conficker/Downadup worm is in the millions, according to the Shadowserver Foundation, which monitors botnets.17 Dec 2009
Security Management Strategies for the CIO