-
Quiz: Database application security
How much do you know about database application security? Take this short quiz to determine what you've learned.30 Jul 2010
-
Forrester offers new guide for information security program development
The research firm's new 123-point maturity model is intended to go beyond COBIT as a more comprehensive way to help companies find and fix gaps in their infosec programs.30 Jul 2010
-
ICANN announces DNSSEC deployment to root Internet servers
Announced at this week's Black Hat Briefings, root servers and Internet domains have now been signed with DNSSEC.30 Jul 2010
-
Adobe vulnerability management: Arkin on the new threat landscape
LAS VEGAS -- Brad Arkin and Adobe Systems Inc. have had to endure a lot of ribbing at Black Hat 2010. Arkin,...30 Jul 2010
-
Cyber Security Readiness
30 Jul 2010
-
Microsoft schedules patch for Windows Shell flaw
Update planned for Monday to fix zero-day vulnerability in wake of increased attacks.30 Jul 2010
-
Database application security: Balancing encryption, access control
Database applications are often the epicenter of a company's sensitive data, so security is paramount, but maintaining a balance between security and business use can be tricky. In this tip, Andrea...30 Jul 2010
-
Black Hat: Researchers poke holes in HTTPS, SSL Web browser security
Attackers capable of carrying out man-in-the-middle attacks to hijack Web browsing sessions can go further and render Web security protocols HTTPS and SSL/TLS useless against attack.29 Jul 2010
-
Windows Server 2008 migration: Is it essential?
While many experts say the Windows Server 2008 operating system is Microsoft's most secure OS yet, expert Michael Cobb explains why a migration may not be essential for all companies.29 Jul 2010
-
Black Hat: Poor SCADA systems security 'like a ticking time bomb'
An analysis of 120 security assessments at power plants, oil and chemical refineries and other critical systems revealed tens of thousands of security vulnerabilities, outdated operating systems an...29 Jul 2010
-
How to use Wget commands and PHP cURL options for URL retrieval
When TCP or HTTP connections aren't behaving as expected, free tools like Wget and cURL can help with URL retrieval. Learn more in this expert response from Anand Sastry.29 Jul 2010
-
Application event log management: The final frontier?
Diana Kelley and veteran CISO James McGovern discuss the need for a application event log management standard.29 Jul 2010
-
Log management best practices: Five tips for success
The right log management tool can quickly seem like the wrong one without advance planning on how to make the most of it. Diana Kelley offers six log management best practices to help do just that.29 Jul 2010
-
Quiz: Application and network log management program planning
Find out how much you've retained from the Application and log management program planning Security School lesson.29 Jul 2010
-
Attackers are turning to mobile platforms, researcher says
In this interview, Mikko Hypponen, chief research officer, F-Secure Corp. talks about what he sees as the coming mobile security threats.28 Jul 2010
-
Can regional banking Trojans hide from signature-based antivirus?
Signature-based antivirus is useful for detecting many different kinds of malware, but has a notoriously difficult time tracking regional malware. In this expert response, Nick Lewis explains how r...28 Jul 2010
-
Smart grid security will require risk management
To a large degree, smart grids, and the nascent IP networks that control them, represent a voyage into the technological unknown. Learning to secure them may be tricky.28 Jul 2010
-
Researchers uncover Cisco firewall vulnerabilities, McAfee console flaws
While the vendors have released patches, SecureWorks researchers told Black Hat 2010 attendees that many enterprises place too much trust in their security systems and fail to check them for basic ...28 Jul 2010
-
Microsoft seeks true 'responsible' vulnerability disclosure
In an interview at Black Hat 2010, the software giant said it doesn't see the need to join Mozilla and Google in paying security researchers who discover bugs in its products. It also announced a n...28 Jul 2010
-
Verizon data breach report 2010: Insider breaches on the rise
The company's highly anticipated report, which this year combines Secret Service data to analyze nearly 900 individual data breach cases, shows an increase in breaches by insiders, while overall br...28 Jul 2010
Security Management Strategies for the CIO