Email Alerts
-
Scientists band together for TRUST-worthy research
A group of the nation's top computer scientists and colleges are teaming up to find better ways to protect computing systems from cyberattacks. Article
-
IBM and friends tout open source ID management
Big Blue is teaming up with Novell and others on Project Higgins, an open source project to simplify and secure Internet ID management. Article
-
RSA Reporter's Notebook: Time to outlaw rootkits?
A Homeland Security official says rootkits need to go; how your best employees are leaking confidential data; and the end of perimeter security, for better or worse. Article
-
threat modeling
Threat modeling is a procedure for optimizing network security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of, threats to the system... Definition
-
Has perimeter security become obsolete?
Tatu Ylönen, founder of Helsinki, Finland-based SSH Communications Security Corp., developed the Secure Shell protocol in 1995. Today, millions world... Interview
-
Exploit code targets Windows help system
Attackers could take advantage of a flaw in Microsoft HTML Help Workshop to cause a buffer overflow or launch malicious code. Exploit code is in the wild. Article
-
Architectural Risk Analysis: Traditional Risk Analysis Terminology
Book Chapter
-
Security Blog Log: Surprise! IE 7 beta has a flaw
Security researchers in the blogosphere are buzzing about a flaw in IE 7. Should users wait before taking the browser for a spin? Column
-
Security Bytes: AV firms accused of rootkit use
Also: A flaw is discovered in Microsoft's Visual Studio development suite and some QuickTime users report problems with Apple's most recent security fix. Article
-
Security Blog Wire: Symantec flaw parallels Sony BMG
This week's blog roundup focuses on Symantec and whether it borrowed a page from the Sony BMG playbook by using a hidden program. Column
Security Management Strategies for the CIO