Access "Exploring additional technologies to support antivirus scanning"
This article is part of the May 2004 issue of Are you secure? Adam Putnam says, "Prove it!"
The best time to address a virus infection is when you don't have a virus. Roy Mellinger Director of Information Security, Sallie Mae An alert loan agent at SLM Corp.--better known as Sallie Mae, the college loan company--reported a suspicious e-mail as she was closing up for the day. She had spotted one of the earliest instances of the MyDoom.G worm. This interrupted the dinner plans of Mark Houpt, Sallie Mae's technical security team leader."It didn't even have a name yet," Houpt says. Worse, there was no AV signature for the variant. Houpt ended up sleeping on the floor of Sallie Mae's Indiana data center waiting for Computer Associates to release new definitions (which arrived around 3 a.m.). New variants of MyDoom, Bagle and Netsky have been spotted daily--sometimes several times a day--since they first appeared in the opening months of 2004. Estimates place February as the worst month on record for malware because of these rapid and voluminous outbreaks. Roy Mellinger, Sallie Mae's director of information security, was on a plane home from Virginia ... Access >>>
Premium Content for Free.
Should new information security laws include auditing requirements?
by Erik Sherman
Get your security act together or Adam Putnam will do it for you. Federal information security laws and regulations could be the next thing infosec management has to worry about. Here you will learn about pending security laws requring security auditing requirements in this feature.
Exploring additional technologies to support antivirus scanning
by George A. Chidi Jr.
Security managers are looking beyond conventional AV to ensure business continuity and improve disaster recovery times.
Using email spam filtering techniques to get rid of spam
by Amber Plante
Filters stem the flow of junk email, but spam remains a big distraction. Learn how to use spam filtering techniques to get rid of spam.
- Should new information security laws include auditing requirements? by Erik Sherman
Secure data transmission with wireless access controllers
by Jon Edney
Sending data over the airwaves is risky. Wireless access controllers assure secure data transmission and reception.
Why and how the CISO job description is changing
by Gary Lynch
The Chief Information Security Officer (CISO) job description is changing. The new CISO must know how to quantify risk and how to understand business as well as computer security technologies.
- Secure data transmission with wireless access controllers by Jon Edney
Government cybersecurity: What is being done to fight cybercrime?
by Lawrence M. Walsh
Learn what can be done to fight cybercrime against privately owned networks.
Industry needs less ethical computer hacking, more risk management strategies
by Jay Heiser, Contributor
Enterprises need less ethical computer hacking and a better risk management strategy.
How to avoid Windows XP Service Pack 2 problems
by Victor R. Garza
Testing XP SP2 beta today will pay off in the long run and help admins to avoid any Windows XP Service Pack 2 problems.
Enhancing secure coding practices to secure your machine
by Pete Lindstrom, Contributor
Learn preventative measures to help improve secure coding practices and protect and secure your machine from the latest threats.
Laws of security: 10 security best practices
by Andrew Briney
Learn the laws of security and 10 security best practices.
- Government cybersecurity: What is being done to fight cybercrime? by Lawrence M. Walsh
More Premium Content Accessible For Free
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...
In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of ...
As the number of Internet-connected devices grows, the potential security challenges of the so-called "Internet of Things," or IoT, can no longer be ...