• SYN flood (half open attack)

    SYN flooding is a method that the user of a hostile client program can use to conduct a denial-of-service (DoS) attack on a computer server.

  • digital certificate

    A digital certificate is an electronic "passport" that allows a person, computer or organization to exchange information securely over the Internet using the public key infrastructure (PKI). A digi...

  • COBIT

    COBIT  is a framework for developing, implementing, monitoring and improving information technology (IT) governance and management practices.

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a cou...

Security Resources

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Data leakage problem tough to solve

    Companies are searching for ways to prevent sensitive information from slipping out of their networks, but various technologies to address the problem have their drawbacks. 

  • RSA 2005: Passwords at the breaking point

    A thread throughout several RSA Conference keynotes and panels Tuesday was stronger authentication and better password management to rebuild reputations eroded by phishing schemes. 

  • A security tale: From vulnerability discovery to disaster

    A security practitioner discovers a gaping hole that puts millions' personal and financial data at risk. Then the real shock begins. 

  • Analyst warns to keep tech talk out of security policies

    It's easy to get carried away when developing or revamping a corporate security policy, but one expert at Information Security Decisions says it's actually much better to keep things short and simple. 

  • Operational risk another facet of compliance

    Fortune 500 summit examines operational risk management as a key challenge for financial institutions. 

  • 10 emerging malware trends for 2007

    From phishing threats to zero-day flaws, hackers have certainly developed many sophisticated ways to exploit vulnerabilities for their gain. And, as SearchSecurity.com's information security expert Ed Skoudis explains, new methods are constantly bein... 

  • Credit union takes top-down approach to compliance

    Regulatory compliance can torture an IT staff, but it doesn't have to. One credit union met compliance regulations by consistently relying on its framework, policies and procedures. 

  • BotHunter

    BotHunter is a type of bot application that looks for other bots by tracking two-way communication flows between active software inside a private network and external entities... (Continued) 

  • Patch Tuesday

    Patch Tuesday, also known as Black Tuesday, is the second Tuesday of each month, when Microsoft releases the newest fixes for its Windows operating system and related software applications. 

  • Diffie-Hellman key exchange (exponential key exchange)

    Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses a number raised to specific powers to produce decryption keys that are never directly transmitted, making the task of a would-be code break...