• SYN flood (half open attack)

    SYN flooding is a method that the user of a hostile client program can use to conduct a denial-of-service (DoS) attack on a computer server.

  • digital certificate

    A digital certificate is an electronic "passport" that allows a person, computer or organization to exchange information securely over the Internet using the public key infrastructure (PKI). A digi...

  • COBIT

    COBIT  is a framework for developing, implementing, monitoring and improving information technology (IT) governance and management practices.

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a cou...

Security Resources

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Data leakage problem tough to solve

    Companies are searching for ways to prevent sensitive information from slipping out of their networks, but various technologies to address the problem have their drawbacks. 

  • A security tale: From vulnerability discovery to disaster

    A security practitioner discovers a gaping hole that puts millions' personal and financial data at risk. Then the real shock begins. 

  • RSA 2005: Passwords at the breaking point

    A thread throughout several RSA Conference keynotes and panels Tuesday was stronger authentication and better password management to rebuild reputations eroded by phishing schemes. 

  • Credit union takes top-down approach to compliance

    Regulatory compliance can torture an IT staff, but it doesn't have to. One credit union met compliance regulations by consistently relying on its framework, policies and procedures. 

  • Security exec Moritz leaving CA

    Ron Moritz will depart after five years as CA's chief security strategist. It's the latest in a string of issues that have called the company's strategy into question. 

  • XP SP2 pushed back

    A network management expert and Windows MVP outlines highlights from the coming release of Microsoft's much-anticipated Windows XP Service Pack 2. 

  • Security Bytes: Cisco warns of IOS, OpenSSL flaws

    In other news, a shoe retailer settles a data disclosure dispute with the FTC and a hacker figures out how to use an IE flaw to target Google Desktop. 

  • Sun fixes multiple Java flaws

    Attackers could exploit flaws in the Java Runtime Environment and Management Extensions to read and write local files or execute applications. 

  • Interview: Jennifer Granick's take on 'Ciscogate'

    Months have passed since her client came under legal scrutiny at Black Hat, but the attorney for Michael Lynn still has plenty to say about responsible vulnerability disclosure. 

  • Review: SmartCenter provides tool you can use

    Information Security magazine explains why Check Point's security management tool is "tight."