Email Alerts
-
The pros and cons of application firewalls
In this Ask the Expert Q&A, our application security expert discusses the pros and cons of application firewalls. He also explains how they differ from packet filter and stateful inspection firewalls, and why they are not the preferred among some org... Ask the Expert
-
SAP Security Learning Guide
This guide pulls SAP security information from both SearchSecurity.com and its sister site, SearchSAP.com, to provide the most comprehensive resource around for all aspects of making your SAP system bulletproof. Learning Guide
-
Authenticating Web applications to SQL
Learn how to securely authenticate Web applications to various databases. Ask the Expert
-
OPatch, wherefore art thou?
You think the Oracle patching utility installed the latest critical patches, but you may still be vulnerable -- and non-compliant with federal regulations. Article
-
Storing hashed, encrypted values in a database
Expert advice on storing hashed and encrypted values in a database. Ask the Expert
-
Raising risk prospects with a new SQL injection threat
"Inference attacks" could deliver up your so-called secure database to an attacker. Article
-
Cisco, Black Hat litigation comes to a close
The vendor and partner ISS settle their dispute over a presentation that resulted in criminal charges and cease and desist orders. Article
-
Oracle researcher announces high-risk flaws
A half-dozen new flaws impact Oracle' products; no patches are available, but there are workarounds. Article
-
Oracle issues patches, but misses the mark, again
Oracle's last volley of patches failed to correct at least one issue it claimed to fix. An expert worries that it could happen again this quarter and wonders when other long-anticipated fixes will be issued. Article
-
Phishing for the missing piece of the CardSystems puzzle
A banking insider examines the ties between customized phishing attacks this spring and the CardSystems breach announced soon after. Don't miss his revelations on how they're linked and what the phishers really needed. Column
Security Management Strategies for the CIO