April 2010 | Archive by Month | SearchSecurity.com

April 2010

  • I-SPY Act -- Internet Spyware Prevention Act of 2005 (H.R. 744)

    The I-SPY Act, formally known as the Internet Spyware Prevention Act of 2005 (H.R. 744), is a bill in the U.S. Congress that would criminalize the unauthorized use of spyware, phishing, and other m...

  • intelligence community

    The term intelligence community refers to government and other public agencies as well as private agencies that gather, assemble, and report information that pertains to world or national security.

  • Fortezza

    Fortezza, Italian for "fortress," is a family of security products trademarked by the US government's National Security Agency.

  • Defense Message System (DMS)

    The Defense Message System (DMS) is a secure X.400-based e-mail system developed by the United States government in conjunction with industry partners to ensure safety for critical operations.

  • lifestyle polygraph

    A lifestyle polygraph is a lie-detector (polygraph) test that is administered as a requirement for employment in certain fields.

  • HSPD-7 (Homeland Security Presidential Directive No. 7)

    HSPD-7 (Homeland Security Presidential Directive No. 7) was a directive issued by U.S. President George W. Bush in December, 2003 that updated policies intended to protect the country from terroris...

  • CALEA (Communications Assistance for Law Enforcement Act)

    CALEA (Communications Assistance for Law Enforcement Act) is a United States federal law that enables the government to intercept wire and electronic communications and call-identifying information...

  • National Security Agency (NSA)

    The National Security Agency (NSA) is the official U.S. cryptologic (the science of cryptographic design and decryption) organization.

  • national identity card

    A national identity card is a portable document, typically a plasticized card with digitally-embedded information, that someone is required or encouraged to carry as a means of confirming their ide...

  • National Computer Security Center (NCSC)

    The National Computer Security Center (NCSC) is a U.S. government organization within the National Security Agency (NSA) that evaluates computing equipment for high security applications to ensure ...

  • Tempest

    Tempest was the name of a classified (secret) U.S. government project to study (probably for the purpose of both exploiting and guarding against) the susceptibility of some computer and telecommuni...

  • security clearance

    A security clearance is an authorization that allows access to information that would otherwise be forbidden.

  • government Trojan

    A government Trojan is spyware installed on a computer or network by a law enforcement agency for the purpose of capturing information relevant to a criminal investigation. Government Trojans repre...

  • How to be a Chief Information Security Officer (CISO)

    If being a Chief Information Security Officer (CISO) is your dream job, this video is for you. Ernie Hayden, consultant and former CISO, gives advice on the essentials, including how to keep things...

  • Microsoft warns of serious SharePoint cross-site scripting zero-day

    A cross-site scripting (XSS) flaw in SharePoint Server 2007 and SharePoint Services 3.0 could allow elevation of privilege within the SharePoint site itself, Microsoft said.

  • Database activity monitoring keeps watch over your data 2

    Database activity monitoring can help with security and compliance by tracking everything going on in the database.

  • Microsoft Windows 7 security features

    Microsoft Windows 7 security aims to improve security without the headaches of Vista.

  • The banking malware scourge

    Criminals are using the Zeus banking Trojan and other malware to hijack online business banking accounts.

  • Database activity monitoring keeps watch over your data

    Database activity monitoring can help with security and compliance by tracking everything going on in the database.

  • OWASP Top 10 vulnerabilities list adds risk to equation

    OWASP Top 10 vulnerabilities list adds risk to methodology used to categorize coding errors.