April 2006
-
April 28, 2006
28
Apr'06
Security Blog Log: Burning about Firefox recruitment
This week, a security blogger frowns on an independent group's efforts to force IE users onto the Firefox bandwagon. Plus, an international fight over identification cards. Continue Reading
-
April 28, 2006
28
Apr'06
How to create and enforce employee termination procedures
In this Ask the Expert Q&A, Shon Harris, our security management expert, reviews how the the security group, HR and management should work together to define and enforce employee termination policies, and reviews what should be done during each ... Continue Reading
-
April 28, 2006
28
Apr'06
Fraud risk assessment methodologies
In this Ask the Expert Q&A, our security management expert provides our member with a series of fraud risk assessment factors to address before a policy is created. Continue Reading
-
April 27, 2006
27
Apr'06
Gap analysis procedures
In this Ask the Expert Q&A, Shon Harris, SearchSecurity's security management expert advises what should be done before a gap analysis is performed, and, provides six common steps of a gap analysis, so organizations will know what to expect before ... Continue Reading
-
April 27, 2006
27
Apr'06
New IE flaws bring tally to three
Two more security holes surfaced in Internet Explorer Thursday, on top of one announced Tuesday. Attackers could exploit the latest flaws to install malicious ActiveX controls and read sensitive data. Continue Reading
-
April 27, 2006
27
Apr'06
Regulatory Compliance and ISO 27001
In this excerpt from Chapter 10 of "The Case for ISO 27001," author Alan Calder explains how using ISO 27001 can help information security professionals deal with the challenges of complying with complex and overlapping regulatory requirements. Continue Reading
-
April 27, 2006
27
Apr'06
How can I open a closed port so my application can access the Internet?
In this network security Ask the Expert Q&A, Mike Chapple, our resident expert, reveals what should be done if you need to re-open a closed port to allow an application to work. Continue Reading
-
April 27, 2006
27
Apr'06
Top U.S. universities failing in online privacy
With the University of Texas the latest to admit it's been hacked, a new national survey shows many of the nation's foremost schools aren't making the grade when it comes to online privacy. Continue Reading
-
April 27, 2006
27
Apr'06
With intrusion defense vendors, one size doesn't fit all
In the final installment of our special series, Intruder Alert, a majority of IT shops say they rely on Cisco and Symantec for intrusion defense, but others say they're just as happy using free open source tools. Continue Reading
-
April 27, 2006
27
Apr'06
Web sites work to punch holes in corporate Web filters
A growing number of Web sites are providing information and tools to help individuals undermine their organizations' Web security systems. Is it a fight against Big Brother, or a security disaster waiting to happen? Continue Reading
-
April 27, 2006
27
Apr'06
NetChk Protect 5.5
Information Security magazine's contributing editor, Wayne Rash , reviews Shavlik Technologies NetChk Protect 5.5 Continue Reading
-
April 26, 2006
26
Apr'06
IE 'object' tag flaw found
Attackers could launch malicious code and corrupt system memory by exploiting the latest Internet Explorer flaw. Experts suggest avoiding untrusted Web sites. Continue Reading
-
April 26, 2006
26
Apr'06
To executives, intrusion defense is a hard sell
Security administrators say intrusion defense frustrates them not only because executives are reluctant to buy in, but also because even the top products have a long way to go. Continue Reading
-
April 25, 2006
25
Apr'06
Microsoft customers want more out-of-cycle patches
Customers say Microsoft was right to issue an out-of-cycle fix for its flawed Windows Explorer patch. In fact, they wish the vendor would do it more often. Continue Reading
-
April 25, 2006
25
Apr'06
Employee termination procedures
-
April 25, 2006
25
Apr'06
Can a non-administrator change the local administrator password on 50 workstations?
In this network security Ask the Expert Q&A our resident expert discusses if it's possible to use the login script to change the local admin password. Continue Reading
-
April 25, 2006
25
Apr'06
Ideal intrusion defense combines processes and people
What defines good intrusion defense? In the first installment of our special three-day series, Intruder Alert, IT pros say the best programs not only thwart insiders with bad computing habits, but also the spyware and other malware they let in. Continue Reading
-
April 24, 2006
24
Apr'06
Security Bytes: More flaws in Mac OS X
In other news: Financial firms scramble over massive online heist, Symantec warns of Scan Engine flaws and a new Snort-based tool is unveiled. Continue Reading
-
April 22, 2006
22
Apr'06
Regulatory compliance: Sun shines on SB-1386
This case study reveals how Michelle Dennedy, Sun Microsystems chief privacy officer, tackled SB-1386 compliance by making it part of the corporate culture. Continue Reading
-
April 21, 2006
21
Apr'06
Microsoft's patch manager gets a refresh
The next version of Microsoft's free Windows patching tool will make its debut at the Microsoft Management Summit. Will it be able to better compete with commercial rivals? Continue Reading