Email Alerts
-
Are open source databases more secure?
They may not be. But a new survey suggests more IT shops are taking an interest in open source options, partly because of security holes in mainstream databases. Article | 26 Oct 2005
-
Admins grapple with latest Oracle patch puzzle
As database administrators digest Oracle's supersize patch release, security experts warn of unfixed flaws and at least one exploit. Article | 24 Oct 2005
-
Active Directory: Keep your domain user accounts in check
Expert Derek Melber signals a warning about securing user accounts in your domain. using Active Directory. Article | 11 Oct 2005
-
Active Directory getting critical look from regulators
Auditors are honing in on directory services to see if companies have internal controls now mandated by law. Article | 27 Sep 2005
-
OPatch, wherefore art thou?
You think the Oracle patching utility installed the latest critical patches, but you may still be vulnerable -- and non-compliant with federal regulations. Article | 15 Aug 2005
-
Raising risk prospects with a new SQL injection threat
"Inference attacks" could deliver up your so-called secure database to an attacker. Article | 31 Jul 2005
-
Cisco, Black Hat litigation comes to a close
The vendor and partner ISS settle their dispute over a presentation that resulted in criminal charges and cease and desist orders. Article | 28 Jul 2005
-
Oracle researcher announces high-risk flaws
A half-dozen new flaws impact Oracle' products; no patches are available, but there are workarounds. Article | 20 Jul 2005
-
Oracle issues patches, but misses the mark, again
Oracle's last volley of patches failed to correct at least one issue it claimed to fix. An expert worries that it could happen again this quarter and wonders when other long-anticipated fixes will be issued. Article | 13 Jul 2005
-
Phishing for the missing piece of the CardSystems puzzle
A banking insider examines the ties between customized phishing attacks this spring and the CardSystems breach announced soon after. Don't miss his revelations on how they're linked and what the phishers really needed. Column | 07 Jul 2005
Security Management Strategies for the CIO