• SYN flood (half open attack)

    SYN flooding is a method that the user of a hostile client program can use to conduct a denial-of-service (DoS) attack on a computer server.

  • digital certificate

    A digital certificate is an electronic "passport" that allows a person, computer or organization to exchange information securely over the Internet using the public key infrastructure (PKI). A digi...

  • COBIT

    COBIT  is a framework for developing, implementing, monitoring and improving information technology (IT) governance and management practices.

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a cou...

Security Resources

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Latest Bagle variants make game of 'Hearts'

    Bagle now likes the "Hearts" online card game. Care for some Solitaire? 

  • Pink slips motivate policy compliance

    Public executions are necessary for ensuring security policy compliance, says Dr. John Halamka, CIO of both Boston's Beth Israel Deaconess Medical Center and Harvard Medical School. 

  • Young SAML must conquer business pressures

    Security Assertion Markup Language is technologically sound, says a Burton Group analyst. Adoption now hinges on business decisions. 

  • New platform takes remote control

    A Texas company has devised software to disable cameras on cellphones at enterprises discouraging their use. 

  • Don't rush to strip the zip

    The recent barrage of worms, many of which arrive as .zip files, has prompted some companies to reconsider blocking such files at the gateway. Yet the decision shouldn't be rash but should be based on a risk assessment. 

  • Microsoft upgrades Outlook flaw to critical

    Microsoft has upgraded an Outlook vulnerability to "critical" after a new way to exploit it was discovered. Users of vulnerable systems are urged to upgrade as soon as possible. 

  • Webcast: Application-layer firewalling -- Raise your perimeter IQ

    In this webcast, we uncover the hype vs. reality of application-layer firewalling, exploring issues such as cost/benefit, technology maturity, and more. 

  • Making products talk vulnerabilities

    Security managers are getting a new tool for combating application vulnerabilities and "death by security bulletin" information overload. 

  • June 2003: The Month in Review

    See which resources grabbed the most page views by you and your peers during the month of June. 

  • 2003 predictions: David Strom

    We asked industry and security experts to give us their predictions for the New Year. Here's what David Strom had to say.