-
Adobe working on patch to correct new zero-day flaw
Adobe Reader and Acrobat contain memory corruption errors that could be exploited by an attacker to execute arbitrary code.30 Apr 2009
-
Swine flu outbreak results in spam pandemic
Spammers are taking advantage of the swine flu outbreak to trick users into giving up their email address, open a malicious PDF file and even buy a cure.30 Apr 2009
-
Despite recession, pay climbs for top IT security certifications
The value of security certifications continued to increase in Q1 2009, proving that certs could be a worthwhile investment for those looking to boost their salaries.30 Apr 2009
-
Encryption in data management should never be ignored, expert says
It isn't always convenient to encrypt sensitive data as part of an e-discovery process, but a data management expert at the Computer Forensics Show said its use is essential.29 Apr 2009
-
Creating Effective Policies and Procedures
A business impact analysis is a manual that helps your company weather disasters. It can help drive security functions such as vulnerability assessment, risk management and incident response. Strat...29 Apr 2009
-
Senators hear call for federal cybersecurity restructuring
Congress is mulling over whether to give more authority on cybersecurity issues to the Department of Homeland Security or create a new office within the White House.28 Apr 2009
-
Cyberwarfare, targeted attacks pose increasing infosec threat
A malware expert at the Computer Forensics show says despite notable gains for the industry, the danger posed by cyberwarfare and organized crime pose a host of major challenges.28 Apr 2009
-
How to perform Microsoft Baseline Security Analyzer (MBSA) scans
This month, Peter Giannoulis of TheAcademyPro.com and TheAcademyHome.com offers an overview of the free Microsoft Baseline Security Analyzer.27 Apr 2009
-
The difference between AES encryption and DES encryption
Choosing whether to encrypt your network data with the AES encryption algorithm or the DES encryption algorithm, is an important security matter. Learn which is the more secure option in this exper...24 Apr 2009
-
Operational risks could mire virtualization deployment, panel says
Future virtualization platforms and features could cause confusion when managing who owns virtual machines within an organization and how network traffic can be monitored.23 Apr 2009
-
RSA researcher Ari Juels: RFID tags may be easily hacked
Ari Juels, chief scientist and director of RSA Laboratories, is one of the world's foremost cryptographers. He is well-known for his research and publications on biometric security, RFID security and...23 Apr 2009
-
How to choose between source code reviews or Web application firewalls
Michael Cobb explains how to make the right choice between Web application firewalls or source code security reviews.23 Apr 2009
-
Opinion: Gartner gets NAC wrong, again
Columnist Eric Ogren has harsh words for Gartner following the recent release of its NAC magic quadrant report. The reality, Ogren writes, is that NAC isn't maturing; it's already half dead.22 Apr 2009
-
Government needs a plan to limit Web usage during a security crisis
A panel of government officials says the Net neutrality debate will heat up as cybersecurity becomes a bigger priority at the federal level.22 Apr 2009
-
SIEM: Not for small business, nor the faint of heart
Technologists say security information and event management success depends not on the product, but on the risk and information management program implemented with it. Also, small businesses lack t...22 Apr 2009
-
Secure software development starts before coding begins
Source code and binary analysis tools both play a role in secure software development, but experts say careful planning, better education and a lot of hard work are even more important.22 Apr 2009
-
Firefox update addresses several security flaws
Mozilla's latest browser release repairs a critical vulnerability that could have been exploited to run arbitrary code.22 Apr 2009
-
White House cybersecurity advisor calls for public-private cooperation
Melissa Hathaway delivered precious few details about her 60-day review of the country's cybersecurity policies and structures during her RSA Conference keynote.22 Apr 2009
-
When to use open source security tools over commercial products
When budgets are cut and open networks still need securing, it may be helpful to try open source security tools as a sufficient and affordable alternative to pricey commercial products.22 Apr 2009
-
Mimic the IBM approach to security at RSA
Columnist Eric Ogren says IBM's announcements at the 2009 RSA Conference should remind security pros that security should be built into business initiatives rather than layered on as an afterthought.21 Apr 2009
Security Management Strategies for the CIO