Risk assessments metrics and frameworks
- October 26, 2004
Small and medium-sized businesses, especially those that team with big players, are leaving everyone vulnerable to attacks when flaws go unnoticed. There are some steps that SMBs can take to find their networks' weaknesses -- and fast.
- August 26, 2004
Use of service-level agreements rises as enterprises realize growing legal and regulatory risks in an increasingly complex global economy. But their emergence also raises questions about the legality and enforceability of contracts that are still ...
- August 23, 2004
When all else fails, there's cyberinsurance. Learn how to enhance security risk management with cyberinsurance.
- August 16, 2004
Security luminary Dan Geer says the information security community needs to do more -- and now -- to avoid national catastrophes and still meet consumer needs.
- July 28, 2004
Presentations beginning today will analyze vulnerabilities, zero-day code, phishing and secure wireless deployment, among many other topics.
- June 30, 2004
When deciding to outsource, consider the security of the vendor and make sure you monitor it, according to an American Express executive.
- June 24, 2004
New Notes and Domino security flaws could be exploited to conduct cross-site scripting attacks and compromise some systems, but a Domino security expert says neither should be considered a major threat.
- June 21, 2004
IT executives speaking at a recent conference on risk management preached that there's a better way than trying to buy technology to cover every possible security threat.
- June 10, 2004
Gartner Group's Victor Wheatman said Wednesday that security spending actually will decrease in the near future as enterprises improve security management and efficiency. The managing vice president's predictions punctuated the research firm's ...
- June 02, 2004
A new manual that discloses vulnerabilities may have had a hand in compromises at supercomputing centers this spring.
- May 26, 2004
Major software companies unveil hardware-based vulnerability and server security solutions.
- May 19, 2004
A new study shows the window between vulnerability and exploit code releases has narrowed from months to mere days.
- April 20, 2004
Conference goers weigh which government incentive is more effective in moving companies towards more secure networks and systems.
- April 08, 2004
Ever since primary election ballots were cast electronically this political season, people have cried foul over results. Now an e-vote company that audits ballots has released its source code to demonstrate that every vote counts.
- March 04, 2004
Reader inquiries about security issues surrounding .zip files prompted a Q&A with Wild List moderator Bruce Hughes, who cites more than 40 worms since 1999 that have taken advantage of the compressed file format to spread.