February 2006
-
February 28, 2006
28
Feb'06
Secure email exchange: Establishing security associations
What happens if a security association can not be established during an email exchange? Michael Cobb has the answer. Continue Reading
-
February 28, 2006
28
Feb'06
Dealing with passwords that can't authenticate to the server
Learn how to deal with passwords that can't authenticate to the server, and where to find resources that will help you troubleshoot this problem. Continue Reading
-
February 28, 2006
28
Feb'06
IBM and friends tout open source ID management
Big Blue is teaming up with Novell and others on Project Higgins, an open source project to simplify and secure Internet ID management. Continue Reading
-
February 28, 2006
28
Feb'06
Bingo card authentication systems
In this Ask the Expert Q&A, our identity and access management expert explains what a "bingo" card authentication system is, how it works and how secure it is. Continue Reading
-
February 28, 2006
28
Feb'06
Oracle releases critical, out-of-cycle patch
Two months ahead of its next scheduled patch release, the database giant fixes critical security holes in its E-Business Suite. The flaw is in the software's diagnostic feature. Continue Reading
-
February 28, 2006
28
Feb'06
Future CISOs need a 'softer side'
Experts weigh in on what it now takes to move beyond a cubicle to the C-suite, and it isn't delving even deeper into manuals and schemas. Continue Reading
-
February 28, 2006
28
Feb'06
How to securely distribute one-time password tokens
In this Ask the Expert Q&A, our identity and access management expert examines how to properly distribute one-time password (OTP) tokens to your employees so they don't leave your systems open to an attack. Continue Reading
-
February 27, 2006
27
Feb'06
'Crossover' malcode could jump from PC to handheld
Researchers say they've found the first malicious code built to spread from desktop PCs to wireless handhelds, and it could signal a shift in the threat landscape. Continue Reading
-
February 27, 2006
27
Feb'06
Making sense of the maze
The program director of regulatory compliance for the Object Management Group discusses a new project known as Compliance Global Regulatory Information Database, which should help businesses manage regulatory compliance demands across international ... Continue Reading
-
February 27, 2006
27
Feb'06
Threats don't diminish Mac's reputation
IT pros still believe Mac OS X is more secure than Windows, despite recent challenges, but that isn't likely to help it unseat Windows in the enterprise. Continue Reading
-
February 27, 2006
27
Feb'06
Outsourcing: Understanding the business risks
In this Ask the Expert Q&A Shon Harris, our security management expert reviews business risks associated with outsourcing security jobs to developing countries and learn how security managers can reduce these risks. Continue Reading
-
February 27, 2006
27
Feb'06
More from SearchSecurity -- March 2006
Highlights from the February 2006 issue of Information Security Magazine. Continue Reading
-
February 27, 2006
27
Feb'06
Yahoo fixes SSL flaw in Business E-mail
The company made adjustments to the program after a security expert discovered user IDs and passwords were being transmitted in plaintext.
Editor's note: This article now includes Yahoo's e-mail address through which security issues can be ... Continue Reading -
February 24, 2006
24
Feb'06
anonymous Web surfing (Web anonymizer, SafeWeb)
Anonymous Web surfing allows a user to visit Web sites without allowing anyone to gather information about which sites the user visited. Continue Reading
-
February 24, 2006
24
Feb'06
Hey, Mac. Is that a worm in your Apple?
In this week's Security Blog Log, Bill Brenner looks at the furor over new threats targeting Mac OS X -- long considered a more secure alternative to Windows. Continue Reading
-
February 24, 2006
24
Feb'06
Security Bytes: Shockwave flaw fixed
In other news, McAfee employee data goes missing and an IT exec gets eight years in prison for data theft. Continue Reading
-
February 24, 2006
24
Feb'06
Sourcefire's Roesch pledges long, open source life for Snort
SAN JOSE, Calif. -- You might not expect it, but one of the security industry's most successful executives shares a house with his mother-in-law.
In fact, Martin Roesch, founder and chief technology officer of Sourcefire Inc., and inventor of ... Continue Reading
-
February 22, 2006
22
Feb'06
Security Bytes: Microsoft frowns on iDefense hacking challenge
Meanwhile, Google Desktop Beta carries security risk; Sophos update leads to false positives for Mac malcode; and a Kaspersky glitch causes Microsoft users e-mail trouble. Continue Reading
-
February 21, 2006
21
Feb'06
IT pros: We can't stop every threat
Mergers, staff shortages and fast tech deployments mean some security incidents probably went undetected last year, a recent survey found, and many fear it will happen again. Continue Reading
-
February 21, 2006
21
Feb'06
Six steps to beating backup server hacks
Are your backup servers also backdoor servers? If you're not specifically addressing their vulnerabilities, they just might be. In this tip, W. Curtis Preston looks at the security issues behind backup servers and offers a quick list of things you ... Continue Reading