In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.
The information security pro’s resource for keeping corporate data, applications and devices secure
Download Now!Definition
In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.
Adobe Reader X uses Microsoft's sandboxing technology to block potentially dangerous processes from executing beyond the confines of the software.
Microsoft repaired four vulnerabilities in its Forefront Unified Access Gateway and a critical flaw in Microsoft Office.
Download the entire October 2010 issue of Information Security magazine here in PDF format.
On the heels of Echopass achieving PCI Level 1 certification, CISO Dennis Empey offers PCI guidance for other cloud providers navigating the process.
Certification expert Ed Tittel examines the growing number of cloud computing security certifications, both vendor-neutral and vendor-specific.
Video: Cloud Security Alliance COO John Howie discusses the 'intelligent security' strategy necessary for cloud providers to defeat targeted attacks.
Apple's free iWork is considered a Trojan horse, since it gives new iOS device users an office productivity suite ahead of Microsoft Office for iOS.
IT and workers alike can reap benefits from using the consumer cloud, but admins have to get past the concerns over data security first.
A mobile workforce that uses the cloud needs their company to think about end-user segmentation to determine the best devices for their needs.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
The latest variant of the banking Trojan is causing numerous problems, Symantec said.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
Big data analysis of IP addresses performed by OpenDNS kept some 50 million users from falling prey to the hijacking of The New York Times website.
Assessing risk tolerance is a key part of a cloud risk management strategy. In this tip expert Ed Moyle explains how to assess cloud risk tolerance.
The nearly ubiquitous TPM device is an often-overlooked tool in an infosec pro's arsenal. Expert Michael Cobb details the benefits of TPM security.
Mobile-dependent Indian businesses must secure networks against viruses as McAfee reports a large jump in Android-based malware
Security researchers say they bypassed the security of cloud-based storage service Dropbox and gained access to private user files
Android-based malware has grown 35% in the second quarter, according to the latest threat report from security firm McAfee
CIOs worried about cyber risk are increasingly turning to cyber insurance to offset risk. But is the cover as black and white as it first seems?
Jaguar Land Rover's IT team takes its newly virtualised infrastructure to the next stage of IT evolution by adopting cloud-based services
A fingerprint sensor has been built into Apple's latest iPhones. Computer Weekly looks at what this means for enterprise security