Email Alerts
-
Startup Symplified delivers SSO in the cloud
Mid-sized enterprises lack the money and expertise to implement identity management for Web-based services. Startup Symplified is banking on the software-as-a-service (SaaS) model as a solution. Article
-
Protecting exposed servers from Google hacks (and Google 'dorks')
Search engines are now routinely used to find ways of gaining unauthorized access to servers. Michael Cobb explains how to avoid exposing your important data to 'Google dorks.' Ask the Expert
-
Apple updates QuickTime to plug dangerous flaw
Media processing errors could be exploited remotely by an attacker to gain control of a victim's machine. Article
-
Which automated quality assurance tools can be used to test software?
If your application development process is not yet addressing security at all six phases of the lifecycle, now is the time to start. Application security expert Michael Cobb explains which quality assurance tools can help. Ask the Expert
-
PCI compliance and Web applications: Code review or firewalls?
The Payment Card Industry Data Security Standard is about to get a new wrinkle involving Web applications. As of June 30, 2008, to achieve PCI compliance, enterprises must either have their custom Web application code reviewed or install Web applicat... Tip
-
Google tries to nurture culture of security
By design, Google's security team is primarily composed of engineers, the search engine giant's security director noted during an interview at RSA Conference 2008. Article
-
Best practices for using restriction policy whitelists
Ed Skoudis discusses which systems should be considered for software restriction policy whitelists, and unveils how whitelisting can improve security. Ask the Expert
-
What ports should be opened and closed when IPsec filters are used?
In this SearchSecurity.com Q&A, application security expert Michael Cobb explains how to set up separate branch IPsec filters that connect with a head office. Ask the Expert
-
Microsoft warns of actively exploited Word flaw
Microsoft is investigating active attacks on a database engine vulnerability being exploited through malicious Word documents. Article
-
Application hardening tools help repel software pirates
Application hardening vendors can make life difficult for software pirates, forcing them to turn to more profitable, low-hanging fruit. Article
Security Management Strategies for the CIO