PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
January 2006

Peak of Security

IE 7.0, Firefox, Netscape: One browser is at The Peak of Security. We'll tell you which comes out on top. The Web browser has evolved into one of our most important desktop applications--and an enormous security concern. Shaken by years of one critical vulnerability after another, businesses are demanding better security in the nearly ubiquitous Microsoft Internet Explorer, or taking a hard look at alternatives, such as the popular newcomer Firefox. Browsers are responsible for everything from security application management interfaces to Internet access to our brick-and-mortar bank accounts to MP3 players. Organized criminals exploit the Web to access corporate systems and databases and steal passwords and credit card numbers from individual users. Users have switched to the open-source Firefox in large numbers since its release in late 2004, cutting IE's market share. Driven by the perception that it's more secure--as well as having cool features like tabbed windows--Firefox has garnered an estimated 8 to 11 percent of ...

Access this PRO+ Content for Free!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

Safe Harbor

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • Mining NetFlow

    Your routers and switches can yield a mother lode of security information about your network--if you know where to dig

  • Help From Above

    Security managers are looking to the keepers of the Internet cloud for relief.

  • Secure communications

    by  Dr. Juergen Schneider

    This tip covers ways that you can secure a network to protect data from internal as well as external attacks.

Columns in this issue