Email Alerts
-
Video: Changes ahead for MIT Kerberos Consortium
MIT's Kerberos Consortium members discuss the evolution of Kerberos, changes ahead for the widly used authentication platform and the issues that threaten its future. Article | 02 Apr 2008
-
Kerberos security evolves for B2B, mobile tech
Kerberos is a dominant authentication protocol, embedded in Windows, Solaris and multiple Linux flavors. But with new threats and new technology, an upgrade is in order. Article | 02 Apr 2008
-
Kerberos: Authentication with some drawbacks
Kerberos is one of the most-widely used authentication methods today, but experts explain that it comes with some weaknesses. Article | 02 Apr 2008
-
Sun shifts strategy with GRC push
Sun Microsystems is making a move into the governance, risk and compliance market, ramping up the competition against Oracle, IBM, CA and others. Article | 04 Mar 2008
-
Hashing out stronger password authentication
Stanford University researchers have created a browser extension to improve Web security and prevent phishing and other attacks. Article | 17 Jan 2008
-
Who, or what, is reading your email?
According to a new survey, fear of data leaks has caused many large companies to hire staff specifically to read and analyze outbound employee email. Article | 17 Jan 2008
-
Black Hat 2007: More on the dangers of Ajax
One of the presenters at this year's Black Hat USA 2007 conference in Las Vegas is Billy Hoffman, a researcher with SPI Dynamics. Hoffman made headlines at last year's conference with a series of presentations on application security, particularly th... Interview | 25 Jul 2007
-
Researchers expose Ajax programming dangers
Two security engineers from SPI Dynamics comb resources on the Net to build an Ajax application from scratch; the final product is rife with problems. Article | 25 Jul 2007
-
Web security gateways meet rising malware threats
Web security gateways combine layered defense against the rising tide of Web-based malware with URL filtering and application control. Article | 12 Jul 2007
-
Web applications tangle security researchers, attract attackers
Web application security researchers are finding that some of their work could land them on the wrong side of the law. As a result, Web applications are more vulnerable to attack. Column | 14 Jun 2007
Security Management Strategies for the CIO