• SYN flood (half open attack)

    SYN flooding is a method that the user of a hostile client program can use to conduct a denial-of-service (DoS) attack on a computer server.

  • digital certificate

    A digital certificate is an electronic "passport" that allows a person, computer or organization to exchange information securely over the Internet using the public key infrastructure (PKI). A digi...

  • COBIT

    COBIT  is a framework for developing, implementing, monitoring and improving information technology (IT) governance and management practices.

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a cou...

Security Resources

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • How serious are the new XP SP2 flaws?

    Microsoft disputes severity of multiple Windows XP SP2 flaws reported by Finjan Software. 

  • Attacking the alternative

    Will Firefox be a bigger target if more people embrace it as an alternative to Internet Explorer? IT security experts offer mixed views. 

  • Microsoft fixes spoofing flaws in ISA, Proxy Server

    The software giant's November bulletin doesn't cover the Internet Explorer IFRAME flaw three new Mydoom variants have exploited. 

  • IT pressing ahead with XP SP2 despite concerns

    Application compatibility and business continuity are the greatest worries with the desktop upgrade, a new study finds. 

  • E-voting concerns outlast election

    Election Day passed without e-voting chaos. But skeptics worry about glitches that may have gone undetected. 

  • Check 21 becomes law

    Implementation of the Check Clearing for the 21st Century Act begins Thursday and could open the door to mass consumer fraud. 

  • Online fraud 101

    Financial institutions concerned about online fraud and phishing can benefit from a crash course in Check 21 risk mitigation techniques and a few other pointers. 

  • Want the perfect dashboard? Wait a few years

    Security dashboards are designed to offer a 360-degree view of a company's security posture. But experts say the technology is young and products that offer the most aren't always best. 

  • Security Bytes: CA to buy Netegrity

    In addition to the acquisition, serious flaws are reported in HP VirtualVault, Mozilla browser and telnet. 

  • ISD Conference '04: Security from the inside out

    The author of two best-selling CISSP books says enterprises must not rely so much on consultants to map strategies.