Email Alerts
-
Data leakage problem tough to solve
Companies are searching for ways to prevent sensitive information from slipping out of their networks, but various technologies to address the problem have their drawbacks. Article | 17 Jan 2008
-
A security tale: From vulnerability discovery to disaster
A security practitioner discovers a gaping hole that puts millions' personal and financial data at risk. Then the real shock begins. Article | 17 Jan 2008
-
RSA 2005: Passwords at the breaking point
A thread throughout several RSA Conference keynotes and panels Tuesday was stronger authentication and better password management to rebuild reputations eroded by phishing schemes. Article | 17 Jan 2008
-
Credit union takes top-down approach to compliance
Regulatory compliance can torture an IT staff, but it doesn't have to. One credit union met compliance regulations by consistently relying on its framework, policies and procedures. Article | 16 Jan 2008
-
Security exec Moritz leaving CA
Ron Moritz will depart after five years as CA's chief security strategist. It's the latest in a string of issues that have called the company's strategy into question. Article | 01 Aug 2007
-
XP SP2 pushed back
A network management expert and Windows MVP outlines highlights from the coming release of Microsoft's much-anticipated Windows XP Service Pack 2. Article | 06 Aug 2006
-
Security Bytes: Cisco warns of IOS, OpenSSL flaws
In other news, a shoe retailer settles a data disclosure dispute with the FTC and a hacker figures out how to use an IE flaw to target Google Desktop. Article | 05 Dec 2005
-
Sun fixes multiple Java flaws
Attackers could exploit flaws in the Java Runtime Environment and Management Extensions to read and write local files or execute applications. Article | 29 Nov 2005
-
Interview: Jennifer Granick's take on 'Ciscogate'
Months have passed since her client came under legal scrutiny at Black Hat, but the attorney for Michael Lynn still has plenty to say about responsible vulnerability disclosure. Article | 01 Oct 2005
-
Review: SmartCenter provides tool you can use
Information Security magazine explains why Check Point's security management tool is "tight." Article | 12 Sep 2005
Security Management Strategies for the CIO