-
Researchers, ISPs fail to contain notorious Pushdo botnet
Despite an effort by ISPs and security research teams to cripple the botnet, follow-up analysis finds it recovering its strength with new command and control servers.31 Aug 2010
-
Opinion: Security information sharing is a shared responsibility
Senior Site Editor Eric B. Parizo says infosec pros need to participate in the public dialog for the good of the industry and offers harsh words for companies who silence their own security talent.30 Aug 2010
-
How to use NeXpose: Free enterprise vulnerability management tools
Learn how to use NeXpose Community Edition, a free collection of vulnerability management tools that offers pre-defined scan templates, and the ability to scan networks, OSes, desktops and databases.30 Aug 2010
-
CA to acquire Arcot Systems for SaaS identity management
CA said Arcot's software as a service delivery model could help accelerate its delivery of CA identity and access management technologies from the cloud.30 Aug 2010
-
How to build a toolset to avoid Web 2.0 security issues
An enterprise defense-in-depth strategy should include security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network, as well as processes put in place to monit...30 Aug 2010
-
Security as a Service (SaaS)
Security-as-a-service (SaaS) is an outsourcing model for security management. Typically, Security as a Service involves applications such as anti-virus software delivered over the Internet but the ...26 Aug 2010
-
Intel-McAfee marriage could fuel renewed chip security interest
Hardware-based security is in use at some enterprises and gains in virtualization are predicted on the horizon, but the technology has seen slow adoption.26 Aug 2010
-
Adobe fixes bevy of critical Shockwave Player vulnerabilities
The popular browser component had 20 holes, 18 considered critical, enabling an attacker to execute code remotely, gain access to files and take control of a victim's computer.25 Aug 2010
-
Desktop virtualization enhances telework security at CDC
The Centers for Disease Control and Prevention has turned to desktop virtualization as a way to provide its teleworkers with all the applications they need to do their jobs from home securely.25 Aug 2010
-
What does the Stuxnet worm mean for SCADA systems security?
SCADA systems have been highlighted in recent months for their insecurities, perhaps most notably with the release of the Stuxnet worm targeting them directly. But is the Stuxnet worm unique, or si...25 Aug 2010
-
CEO must prioritize software development improvements, secure coding
In this interview, Ryan Berg, a senior architect of security research for IBM discusses why some companies lack direction when it comes to secure software development.24 Aug 2010
-
Parade College adpots UTM for network security
Parade College has replaced a Blue Reef security solution with Watchguard UTM devices.24 Aug 2010
-
Unmasking data masking techniques in the enterprise
Patch-testing and development environments can't use live data and keep it secure. That's where data masking comes in. Michael Cobb examines the principles behind data masking and why security pros...24 Aug 2010
-
LANDesk Software acquired by private equity firm
Thoma Bravo said it signed an agreement to buy LANDesk Software from Emerson Electric to further build out its security market portfolio.23 Aug 2010
-
Microsoft issues advisory on DLL load hijacking flaw
Software giant addresses application vulnerability after remote attack vector surfaces.23 Aug 2010
-
Log management strategies that work
In this video presentation, Diana Kelley of consultancy SecurityCurve gives expert advice on how to tune log management tools and policies so they pick up on only the necessary events.23 Aug 2010
-
McAfee acquisitions: What could Intel get?
A deal added encryption to McAfee's offerings and it gained security hardware through its buy of Secure Computing. Intel could gain a stake in nearly all areas of security.19 Aug 2010
-
McAfee/Intel: Why the McAfee acquisition is being met with skepticism
Information security pros in the UK met the Intel acquisition of McAfee Inc. with skepticism for several reasons, including Intel's questionable history of software acquisitions.19 Aug 2010
-
Intel to acquire McAfee in $7.7 billion deal
If the deal is approved by McAfee shareholders, McAfee will operate as a wholly-owned subsidiary, reporting into Intel's Software and Services Group.19 Aug 2010
-
HP to acquire Fortify Software for secure software development
Source code analysis vendor Fortify Software will eventually be integrated into HP's Business Technology Optimization application portfolio. Analysts say acquisition was expected.17 Aug 2010
Security Management Strategies for the CIO