News

Risk assessments metrics and frameworks

  • April 12, 2006 12 Apr'06

    Report: IM, P2P threats on the rise

    Research shows a steady increase in threats that target unauthorized IM and peer-to-peer applications. Worse yet, most IT departments have no way of knowing the threats exist.

  • April 06, 2006 06 Apr'06

    Opinion: The importance of a military mindset

    The military security mindset shouldn't be so quickly dismissed, says Michael Tanji, because military science has spawned many commercially successful technologies and trained many of the professionals who today are the lifeblood of the industry.

  • April 06, 2006 06 Apr'06

    Opinion: Military security legacy is one of innovation, integrity

    In response to a recent column criticizing corporate use of military security guidelines, infosec pro Norman Beznoska Jr. says corporate America has borrowed much of its technology from the armed forces, and could still stand to learn a thing or two.

  • March 20, 2006 20 Mar'06

    Poor government security makes industry wary

    The annual review of government security practices shows several agencies still aren't improving. Experts are worried it could harm Homeland Security's ability to work with the private sector to stop cyberterrorism.

  • March 07, 2006 07 Mar'06

    Security pros aren't stained by BlackBerry tiff

    A BlackBerry blackout would have been tough for on-the-go e-mail addicts, but it was never a security concern, if a survey of IT professionals is any indication.

  • March 07, 2006 07 Mar'06

    Attacks driven by love of money

    Symantec's latest threat report shows digital desperadoes are exploiting Web application flaws and using "modular" malcode to launch lucrative attacks.

  • March 03, 2006 03 Mar'06

    Security Blog Log: Hacking for grades causes a stir

    A college exercise in hacking doesn't sit well with some bloggers. Meanwhile, a bear shows us a thing or two about security and Webroot loses its public voice.

  • February 21, 2006 21 Feb'06

    IT pros: We can't stop every threat

    Mergers, staff shortages and fast tech deployments mean some security incidents probably went undetected last year, a recent survey found, and many fear it will happen again.

  • February 10, 2006 10 Feb'06

    Review: Lucid Security's ipAngel far beyond standard IPS fare

    ipAngel is a cleverly integrated package that will help stop exploits at your perimeter and assess the security of your network.

  • February 09, 2006 09 Feb'06

    Nyxem's lessons can't be ignored

    The worm didn't create the chaos that was expected, but security pros say it would be a mistake to dismiss it as a dud and ignore the valuable lessons.

  • February 07, 2006 07 Feb'06

    For CISOs, fitting in was never so hard

    As more organizations move their security officers out of IT, it may become easier for CISOs to succeed, but harder for other security pros to avoid a career dead-end.

  • January 26, 2006 26 Jan'06

    Passwords still the weakest link

    But more software is beginning to keep insiders from using shared or administrative passwords to access restricted data files, helping to ensure SOX compliance.

  • January 20, 2006 20 Jan'06

    Security Blog Log: Oracle makes Microsoft look good

    Microsoft gets plenty of flak for slow patching, but this week bloggers say they'll take Microsoft's patch process over Oracle's any day.

  • January 12, 2006 12 Jan'06

    Dirty documents cause messy security situations

    What use are firewalls and intrusion prevention systems if insecure digital documents reveal all of an enterprise's best-kept secrets? That's the question many security experts are asking in the wake of several high-profile incidents in which ...

  • December 09, 2005 09 Dec'05

    CSOs say patch management tide is turning

    Security pros at this year's Infosecurity show say IT shops are getting better at patch management. But new threats are emerging, including flaws that never die.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

ComputerWeekly.com

Close