Risk assessments metrics and frameworks
- August 16, 2004
Security luminary Dan Geer says the information security community needs to do more -- and now -- to avoid national catastrophes and still meet consumer needs.
- July 28, 2004
Presentations beginning today will analyze vulnerabilities, zero-day code, phishing and secure wireless deployment, among many other topics.
- June 30, 2004
When deciding to outsource, consider the security of the vendor and make sure you monitor it, according to an American Express executive.
- June 24, 2004
New Notes and Domino security flaws could be exploited to conduct cross-site scripting attacks and compromise some systems, but a Domino security expert says neither should be considered a major threat.
- June 21, 2004
IT executives speaking at a recent conference on risk management preached that there's a better way than trying to buy technology to cover every possible security threat.
- June 10, 2004
Gartner Group's Victor Wheatman said Wednesday that security spending actually will decrease in the near future as enterprises improve security management and efficiency. The managing vice president's predictions punctuated the research firm's ...
- June 02, 2004
A new manual that discloses vulnerabilities may have had a hand in compromises at supercomputing centers this spring.
- May 26, 2004
Major software companies unveil hardware-based vulnerability and server security solutions.
- May 19, 2004
A new study shows the window between vulnerability and exploit code releases has narrowed from months to mere days.
- April 20, 2004
Conference goers weigh which government incentive is more effective in moving companies towards more secure networks and systems.
- April 08, 2004
Ever since primary election ballots were cast electronically this political season, people have cried foul over results. Now an e-vote company that audits ballots has released its source code to demonstrate that every vote counts.
- March 04, 2004
Reader inquiries about security issues surrounding .zip files prompted a Q&A with Wild List moderator Bruce Hughes, who cites more than 40 worms since 1999 that have taken advantage of the compressed file format to spread.
- February 05, 2004
NIST's recently released incident-response guide emphasizes the need for admins to carefully measure the cost of preventing security incidents.
- February 02, 2004
Can the new National Cyber Alert System compete with vendor alert programs already in place? Experts and luminaries have their doubts about the government's latest effort.
- January 21, 2004
A flaw in NetScreen Security Manager needs manual updating until a service pack is released. The vulnerability could expose valuable information to attackers.