-
Obama announces creation of cybersecurity coordinator position
The president promised to treat critical infrastructure as a strategic national asset, and that the cybersecurity coordinator would be responsible for orchestrating cybersecurity policy and respons...29 May 2009
-
Hackers targeting unpatched Microsoft DirectShow flaw
Software giant is investigating a newly discovered flaw in DirectShow's QuickTime parser that could allow an attacker to execute code remotely29 May 2009
-
RIM patches serious BlackBerry Attachment Service flaws
Multiple flaws in the BlackBerry Attachment Service could allow an attacker to pass a malicious PDF file and gain access to system files.28 May 2009
-
Creating an SSL connection between servers
Learn the most secure way to create and SSL connection between servers with this advice from network security expert Mike Chapple.28 May 2009
-
Trust eroding as social engineering attacks climb in 2009, says Kaspersky expert
Kaspersky Lab researchers have tracked more than 25,000 malware samples spreading through social networks in 2009.28 May 2009
-
EMC adds configuration management with Configuresoft acquisition
EMC said it would move Configuresoft into its Resource Management Software Group. The software could detect configuration changes in both virtual and physical environments.27 May 2009
-
How to align an information security framework to your business model
CISOs should consider blending traditional business models with information security frameworks, and not rely solely on regulations to drive security programs.27 May 2009
-
Lesson 2: How to build a secure wireless infrastructure 2
In Lesson 2 of Wireless Security Lunchtime Learning, you'll learn how to build a secure wireless infrastructure by understanding the myriad security standards and features that Wi-Fi products boast...26 May 2009
-
White House cybersecurity czar faces major hurdles
A new cyberczar must reduce interagency squabbles, work with Congress on legislation, but avoid getting bogged down in red tape and bureaucracy, experts say.26 May 2009
-
Comparing an application proxy firewall and a gateway server firewall
There are many types of firewalls in use in today's enterprises, so it's easy to get confused about the functions of each. In this expert response, learn the difference between a proxy server firew...26 May 2009
-
Organizations struggle with data leakage prevention, rights management
Employee use of Web-based services and poor judgment can easily defeat the technologies. But better use of the audit, discovery and reporting features can make them more effective.26 May 2009
-
Cryptography for the rest of us
In this video, learn cryptography techniques for your enterprise that comply with regulatory and legal requirements, as well as what you need to understand before buying or building cryptography so...22 May 2009
-
Hacker attack techniques and tactics: Understanding hacking strategies
This guide provides you with a plethora of tips, expert advice and Web resources that offer more in-depth information about hacker techniques and various tactics you can employ to protect your netw...21 May 2009
-
Adobe shifts to Microsoft patching process, incident response plan
Adobe Systems Inc. said it would bolster its patch management strategy, issuing quarterly updates for its adobe Reader and Acrobat PDF software.21 May 2009
-
Rootkit Hunter demo: Detect and remove Linux rootkits
Peter Giannoulis of The Academy Home and The Academy Pro demonstrates how to install and use Rootkit Hunter, a free rootkit scanner for Linux and BSD distributions.21 May 2009
-
Balancing security and performance: Protecting layer 7 on the network
This video will explain options for securing application-layer traffic using network security technologies, architectures and processes, including Layer 7 switches, firewalls, IDS/IPS, NBAD and more.21 May 2009
-
SIMs tools and tactics for business intelligence
Security information management systems (SIMs) automate the process of looking through logs to help produce effective reports, issue alerts and do forensics. In the era of regulation, organizations...21 May 2009
-
Cybercrime and threat management
It's no secret that cybercrime is an ever-growing issue for today's security professionals, but what roles and responsibilities need to change as a result of the glut in illicit cyber activity? In...20 May 2009
-
IT managers under pressure to weaken Web security policy
A new survey suggests senior and mid-level executives want to expand use of social networking platforms, cloud-based collaboration tools and other applications.20 May 2009
-
US-CERT warns of Gumblar, Martuz drive-by exploits
Websites poisoned with the Gumblar and Martuz drive-by download exploits could pass on malware to users who don't have their patches up to date.19 May 2009
Security Management Strategies for the CIO