Email Alerts
-
threat modeling
Threat modeling is a procedure for optimizing network security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of, threats to the system... Definition
-
Has perimeter security become obsolete?
Tatu Ylönen, founder of Helsinki, Finland-based SSH Communications Security Corp., developed the Secure Shell protocol in 1995. Today, millions world... Interview
-
Exploit code targets Windows help system
Attackers could take advantage of a flaw in Microsoft HTML Help Workshop to cause a buffer overflow or launch malicious code. Exploit code is in the wild. Article
-
Architectural Risk Analysis: Traditional Risk Analysis Terminology
Book Chapter
-
Security Blog Log: Surprise! IE 7 beta has a flaw
Security researchers in the blogosphere are buzzing about a flaw in IE 7. Should users wait before taking the browser for a spin? Column
-
Security Bytes: AV firms accused of rootkit use
Also: A flaw is discovered in Microsoft's Visual Studio development suite and some QuickTime users report problems with Apple's most recent security fix. Article
-
Security Blog Wire: Symantec flaw parallels Sony BMG
This week's blog roundup focuses on Symantec and whether it borrowed a page from the Sony BMG playbook by using a hidden program. Column
-
Security Bytes: Flaws plague Symantec, McAfee
Meanwhile: An IM worm exploits the holidays, Cisco offers workarounds for vulnerabilities in IOS and Oracle is using Forify's technology to boost security. Article
-
Java programming resources
Find Java-specific resources here. Ask the Expert
-
For Microsoft, security and trust prove elusive
Following the recent beta release of its OneCare Live security offering, Microsoft seems poised to dip its toe into the lucrative enterprise security and software services market. Despite its long history of security snafus and monthly patches, the s... Article
Security Management Strategies for the CIO