Risk assessments metrics and frameworks
- December 09, 2005
Security pros at this year's Infosecurity show say IT shops are getting better at patch management. But new threats are emerging, including flaws that never die.
- December 05, 2005
Cenzic's latest version weaves nicely with QA and development teams to test commercial and custom applications for vulnerabilities.
- October 14, 2005
Windows IT managers work to apply critical fixes before exploit code that may have Zotob-like effects can harm vulnerable systems.
- October 05, 2005
The latest upgrade to Citadel's vulnerability management suite includes a library with more than 23,000 vulnerability fixes.
- September 14, 2005
The wireless router has five flaws attackers could use to tamper with passwords and firewalls, install firmware and cause a denial of service.
- September 02, 2005
Symantec announced a fix for a flaw in AntiVirus Corporate Edition Friday afternoon. The security hole could be exploited to view user names and passwords.
- July 27, 2005
Not to be outdone by 3Com's "Zero-Day Initiative," VeriSign says it'll shell out more cash for hackers who provide vulnerability intelligence.
- July 07, 2005
nCircle's IP360 is a viable choice for enterprises challenged with gaining control over their security processes, particularly those invested heavily in Cisco security.
- July 06, 2005
Microsoft Baseline Security Analyzer 2.0 is the newest version of the software company's free vulnerability detection tool.
- February 07, 2005
You're just plugging holes if you don't have the right processes and policies.
- December 16, 2004
Developers of the popular open-source tool are starting to charge commercial customers who bring nothing to the project's development.
- December 14, 2004
The nation's IT landscape is loaded with antiquated software ripe for attack. But a new study suggests most companies don't plan to address the problem.
- November 22, 2004
Exploiting vulnerabilities and capitalizing on configuration errors are the only ways a computer system can be hacked.
- October 26, 2004
Small and medium-sized businesses, especially those that team with big players, are leaving everyone vulnerable to attacks when flaws go unnoticed. There are some steps that SMBs can take to find their networks' weaknesses -- and fast.
- August 26, 2004
Use of service-level agreements rises as enterprises realize growing legal and regulatory risks in an increasingly complex global economy. But their emergence also raises questions about the legality and enforceability of contracts that are still ...