• SYN flood (half open attack)

    SYN flooding is a method that the user of a hostile client program can use to conduct a denial-of-service (DoS) attack on a computer server.

  • digital certificate

    A digital certificate is an electronic "passport" that allows a person, computer or organization to exchange information securely over the Internet using the public key infrastructure (PKI). A digi...

  • COBIT

    COBIT  is a framework for developing, implementing, monitoring and improving information technology (IT) governance and management practices.

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a cou...

Security Resources

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Analyst warns to keep tech talk out of security policies

    It's easy to get carried away when developing or revamping a corporate security policy, but one expert at Information Security Decisions says it's actually much better to keep things short and simple. 

  • Operational risk another facet of compliance

    Fortune 500 summit examines operational risk management as a key challenge for financial institutions. 

  • Data leakage problem tough to solve

    Companies are searching for ways to prevent sensitive information from slipping out of their networks, but various technologies to address the problem have their drawbacks. 

  • Credit union takes top-down approach to compliance

    Regulatory compliance can torture an IT staff, but it doesn't have to. One credit union met compliance regulations by consistently relying on its framework, policies and procedures. 

  • Security exec Moritz leaving CA

    Ron Moritz will depart after five years as CA's chief security strategist. It's the latest in a string of issues that have called the company's strategy into question. 

  • XP SP2 pushed back

    A network management expert and Windows MVP outlines highlights from the coming release of Microsoft's much-anticipated Windows XP Service Pack 2. 

  • Security Bytes: Cisco warns of IOS, OpenSSL flaws

    In other news, a shoe retailer settles a data disclosure dispute with the FTC and a hacker figures out how to use an IE flaw to target Google Desktop. 

  • Sun fixes multiple Java flaws

    Attackers could exploit flaws in the Java Runtime Environment and Management Extensions to read and write local files or execute applications. 

  • Interview: Jennifer Granick's take on 'Ciscogate'

    Months have passed since her client came under legal scrutiny at Black Hat, but the attorney for Michael Lynn still has plenty to say about responsible vulnerability disclosure. 

  • Review: SmartCenter provides tool you can use

    Information Security magazine explains why Check Point's security management tool is "tight."