January 2006
-
January 12, 2006
12
Jan'06
Executive Security Management
-
January 12, 2006
12
Jan'06
Dirty documents cause messy security situations
What use are firewalls and intrusion prevention systems if insecure digital documents reveal all of an enterprise's best-kept secrets? That's the question many security experts are asking in the wake of several high-profile incidents in which ... Continue Reading
-
January 12, 2006
12
Jan'06
Risk Management
-
January 12, 2006
12
Jan'06
The Business Model
-
January 12, 2006
12
Jan'06
The Architectural Model
This security architecture clickable diagram depicts the elements of organizational security architecture and how they interact with each other. The presentation here is slanted toward a corporate view in terms of the usage, but essentially all ... Continue Reading
-
January 12, 2006
12
Jan'06
Technical Security Architecture
-
January 12, 2006
12
Jan'06
The Oversight Function
-
January 12, 2006
12
Jan'06
Common packet capture methods
Excerpted from "Extrusion Defense" by Richard Bejtlich, this tip outlines common packet capture methods for a LAN and WLAN, including hubs, SPAN ports and active participation. Continue Reading
-
January 12, 2006
12
Jan'06
The Control Architecture
-
January 12, 2006
12
Jan'06
Protection Mechanisms
-
January 12, 2006
12
Jan'06
The Protection Process
-
January 11, 2006
11
Jan'06
How to use IPsec filtering rules to filter network traffic
Learn how to control what enters and exits your PCs by using IPsec filtering rules to filter particular protocol and port combinations for both inbound and outbound network traffic. Continue Reading
-
January 11, 2006
11
Jan'06
FBI says attacks succeeding despite security investments
Security products aren't protecting enterprise networks as well as they should, if the latest FBI survey is any indication. (A correction was made to this story.) Continue Reading
-
January 11, 2006
11
Jan'06
RSS: The next malware target?
A recent report from Trend Micro names RSS as the next likely target for bot worm attacks and predicts feed hijackings will be prevalent with the release of IE 7. In this tip, security expert Mike Chapple explains how RSS could be exploited, and ... Continue Reading
-
January 11, 2006
11
Jan'06
Fixes in for BlackBerry vulnerability
Attackers could exploit a security hole in the BlackBerry Enterprise Server to block attachments or launch malicious code. Continue Reading
-
January 11, 2006
11
Jan'06
Apple fixes multiple QuickTime security flaws
Attackers could use maliciously crafted images or media files to cause a denial of service or launch malicious code. A new version of QuickTime fixes the problems. Continue Reading
-
January 10, 2006
10
Jan'06
Security Bytes: Symantec warns of more WMF glitches
In other news, two accused of bogus spyware claims settle with the Federal Trade Commission while a feared Sober explosion fails to materialize. Continue Reading
-
January 10, 2006
10
Jan'06
Multi-dimensional enterprise-wide security: Audit and validation
Learn how to protect information assets and resources within all areas of the enterprise and in compliance with all regulatory, policy and contractual requirements. Continue Reading
-
January 10, 2006
10
Jan'06
Expert: Microsoft TNEF flaw could lead to superworm
The software giant rolled out two more critical fixes Tuesday following last week's critical WMF patch. A security expert warns one flaw could potentially be exploited to cause the fastest-spreading worm attack ever. Continue Reading
-
January 10, 2006
10
Jan'06
Multi-dimensional enterprise-wide security: Define risks
Learn how to protect information assets and resources within all areas of the enterprise and in compliance with all regulatory, policy and contractual requirements. Continue Reading