News

Risk assessments metrics and frameworks

  • December 05, 2005 05 Dec'05

    Review: New Hailstorm a viable in-house pen test option

    Cenzic's latest version weaves nicely with QA and development teams to test commercial and custom applications for vulnerabilities.

  • October 14, 2005 14 Oct'05

    Exploit code lurks following new Windows patches

    Windows IT managers work to apply critical fixes before exploit code that may have Zotob-like effects can harm vulnerable systems.

  • October 05, 2005 05 Oct'05

    Review: Hercules 4.0 provides ample control over vulnerabilities

    The latest upgrade to Citadel's vulnerability management suite includes a library with more than 23,000 vulnerability fixes.

  • September 14, 2005 14 Sep'05

    'Serious' security holes in Linksys router

    The wireless router has five flaws attackers could use to tamper with passwords and firewalls, install firmware and cause a denial of service.

  • September 02, 2005 02 Sep'05

    Symantec glitch could expose user names, passwords

    Symantec announced a fix for a flaw in AntiVirus Corporate Edition Friday afternoon. The security hole could be exploited to view user names and passwords.

  • July 27, 2005 27 Jul'05

    VeriSign raises stakes in battle for threat intelligence

    Not to be outdone by 3Com's "Zero-Day Initiative," VeriSign says it'll shell out more cash for hackers who provide vulnerability intelligence.

  • July 07, 2005 07 Jul'05

    REVIEW: nCircle's IP360 especially helpful for Cisco shops

    nCircle's IP360 is a viable choice for enterprises challenged with gaining control over their security processes, particularly those invested heavily in Cisco security.

  • July 06, 2005 06 Jul'05

    Features added to Windows security checker

    Microsoft Baseline Security Analyzer 2.0 is the newest version of the software company's free vulnerability detection tool.

  • February 07, 2005 07 Feb'05

    Vulnerability mismanagement

    You're just plugging holes if you don't have the right processes and policies.

  • December 16, 2004 16 Dec'04

    Nessus no longer free

    Developers of the popular open-source tool are starting to charge commercial customers who bring nothing to the project's development.

  • December 14, 2004 14 Dec'04

    Outdated software is risky business

    The nation's IT landscape is loaded with antiquated software ripe for attack. But a new study suggests most companies don't plan to address the problem.

  • November 22, 2004 22 Nov'04

    Here, kiddie kiddie

    Exploiting vulnerabilities and capitalizing on configuration errors are the only ways a computer system can be hacked.

  • October 26, 2004 26 Oct'04

    Understanding the 'hole' truth

    Small and medium-sized businesses, especially those that team with big players, are leaving everyone vulnerable to attacks when flaws go unnoticed. There are some steps that SMBs can take to find their networks' weaknesses -- and fast.

  • August 26, 2004 26 Aug'04

    Security warranties look out for the little guys

    Use of service-level agreements rises as enterprises realize growing legal and regulatory risks in an increasingly complex global economy. But their emergence also raises questions about the legality and enforceability of contracts that are still ...

  • August 23, 2004 23 Aug'04

    Enhancing security risk management with cyberinsurance

    When all else fails, there's cyberinsurance. Learn how to enhance security risk management with cyberinsurance.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close