-
Best practices: Identity management - Part 1
In Best practices: Identity management - Part 1, experts Kelly Manthey and Peter Gyurko discuss development, education, strategies involving identity management.30 Dec 2010
-
Best practices: Identity management - Part 2
Do you know how to optimize your identity management? Learn how In part 2 of Best practices: Identity management where experts Kelly Manthey and Peter Gyurko discuss how using case studies involvin...30 Dec 2010
-
Secure VoIP tutorial: Understanding VoIP security best practices
More organizations are choosing to implement VoIP telephony in the enterprise for its cost savings. However, securing the technology comes with its own price tag. This secure VoIP tutorial is a com...27 Dec 2010
-
What is identity management?
Do you know what identity management is and how to properly manage it? This expert video featuring Kelly Manthey and Peter Gyurko explores the role of identity mangement and how it can benefit your...27 Dec 2010
-
Identity management maturity model
Learn about identity management and its capabilities in a detailed maturity model that highlights people, process and technology.27 Dec 2010
-
Microsoft produces workaround for IE zero-day vulnerability
A new Microsoft advisory warns about the Internet Explorer zero-day and urges customers to use the Enhanced Mitigation Experience Toolkit to mitigate the flaw.23 Dec 2010
-
Attack code surfaces for Internet Explorer zero-day vulnerability
The Metasploit Framework contains exploit code that targets a recently uncovered zero-day vulnerability in Internet Explorer.22 Dec 2010
-
Considering iPhone, iPad adoption? Take cybersecurity seriously
If you go with an Apple mobile device in a government enterprise you've got fewer cybersecurity worries, right? Contributor Richard W. Walker investigates.21 Dec 2010
-
Microsoft Outlook 2007 update caused email authentication issues
Microsoft has pulled a non-security update to Outlook 2007 after customers complained of connection and performance issues when the automatic update was applied to company machines.21 Dec 2010
-
Information Security magazine - December/January issue PDF
Download the entire December/January 2010-2011 issue of Information Security magazine here in PDF format.20 Dec 2010
-
ngrep: Learn how to find new malware with ngrep examples
In this video, Peter Giannoulis of the AcademyPro.com uses several ngrep examples to show how to find new malware that antivirus or IPS might not pick up on with this free tool.20 Dec 2010
-
SOC 2.0: Three key steps toward the next-generation security operations center
According to Forrester Research, traditional security operations are no longer practical. Forrester's John Kindervag discusses the new model, SOC 2.0, why it's important, and how to make it happen.17 Dec 2010
-
DDoS mitigation expert predicts more serious application-layer attacks
The WikiLeaks "hacktivist" DDoS attacks pale in sophistication to the more serious application-layer DDoS threats of the future.17 Dec 2010
-
Reviewing your information security career path plan for the New Year
The end of the year is the perfect time to review how your career has played out during the past 12 months and refine future goals. In this tip, infosec career experts Lee Kushner and Mike Murray e...16 Dec 2010
-
Information security 2011: Next-gen threats demand layered defense
Infosec pros got an up-close-and-personal look at advanced attacks in 2010, and Senior Site Editor Eric B. Parizo says without learning from them, many enterprises will fall victim in 2011 as well.16 Dec 2010
-
Core Security launches CISO-level pen testing software
The new Core Insight pen testing suite can lay out the history of testing campaigns and the relative threat level of an enterprise's systems.15 Dec 2010
-
Mozilla extends bug bounty to Web application vulnerabilities
Mozilla will reward vulnerability hunters for critical flaws found on a dozen Mozilla websites.15 Dec 2010
-
Microsoft repairs critical Explorer flaws, Stuxnet malware vulnerability
Microsoft addressed a zero-day vulnerability used by the notorious Stuxnet worm and moved to block ongoing attacks targeting several Internet Explorer zero-day flaws.14 Dec 2010
-
Microsoft December 2010 patches to fix 40 flaws
The software giant's last batch of scheduled fixes for 2010 is a "doozy" that will address critical remote code-execution flaws in Windows and IE.09 Dec 2010
-
TDL4 rootkit copies Stuxnet, targets Windows users
The TDL4 rootkit, a variant of the Alureon rootkit, has been updated to target a zero-day vulnerability in the Windows Task Scheduler.08 Dec 2010
Security Management Strategies for the CIO