Email Alerts
-
Apple fixes Xsan security flaw
Attackers could exploit a security flaw in Apple's Xsan file system to launch malicious code and crash vulnerable machines, but a fix is available. Article
-
Information Security Governance Guide
This guide provides an introduction to what information security governance and a security program are, and examines how to deploy security policies within any environment. Learning Guide
-
Security Bytes: Symantec patches Veritas NetBackup PureDisk flaw
Meanwhile: Two MySQL database flaws are fixed, a study finds that many companies have lost laptops and the VA upgrades computer encryption after recent security breaches. Article
-
Business continuity planning standards and guidelines
An excerpt from Chapter 1: Contingency and Continuity Planning of "Business Continuity and Disaster Recovery for InfoSec Managers," by John W. Rittinghouse and James F. Ransome. Book Chapter
-
Symantec fixes Backup Exec flaw
Attackers could exploit flaws in Symantec Backup Exec 9.1 and 9.2 for NetWare Servers to cause a denial of service, launch malicious code and gain access to vulnerable machines. Article
-
The pros and cons of data wiping
Weigh the pros and cons of software disk-wiping and determine if it can protect against data compromise in this Platform Security Ask the Expert Q&A Ask the Expert
-
VA desktop PC stolen, 36,000 could be at risk
Update: The incident marks the second time in less than three months that a VA device with sensitive information has been compromised. One expert blames the systematic problem of too much internal trust. Article
-
Old attack vectors are back in style
Black Hat: Like hip-huggers and tweed, once-popular attack methods like ciphertext manipulation are finding new life as hackers look to cut through well-worn Web applications. Article
-
Compliance demands a technology toolbox
There's really no one technology answer for regulatory compliance. That's why experts suggest that a variety of tools are needed to meet the requirements of regulations such as Sarbanes-Oxley. Article
-
Disaster recovery report card: Measuring your company's disaster recovery profile
Disaster recovery planning is challenging because you don't know what you're planning for or how well your disaster recovery plan will hold up in the face of an emergency. Use this report card to measure your disaster recovery plan and identify areas... Tip
Security Management Strategies for the CIO