Security: Vulnerabilities


Hackers Using Time-Tested Methods, Not Fancy Technology

ID theft usually involves time-tested methods such as telephone fraud than blockbuster data breaches

Reported Drop in Security Threats Masks Their Severity

The number of new vulnerabilities disclosed by researchers actually declined in 2007 -- the first time that’s happened since 2003 -- but it’s not all good news.

Rogue Trader Highlights Need to Mind Your Controls

In an age of Sarbanes-Oxley and similar regulatory measures, how could a single rogue trader have racked up more than $7 billion in losses?

Enterprise Security: The Human Factor

Why organizations need to get serious about security awareness training

Why Securing Mobile Devices Keeps CIOs Up at Night

With mobile security, the devil you don’t know can hurt you much more than the devil you think you know

Protecting Your Enterprise from the Thriving Cyber Underground

Multiple, overlapping, and mutually supportive defensive systems and patched, up-to-date systems can help consumers and businesses take advantage of the Internet while avoiding its dangers.

Security in Review: Yesterday and Tomorrow

Will it be "same old, same old" in security for 2008?

Research Reveals Steps to Protect Sensitive Data

A new report from the IT Policy Compliance Group examined leaders and laggards to identify core competencies and steps to improve data protection.

Preventing NAC Attacks

Industry standards and trusted hardware keep out unauthorized users and equipment

Paying For Vulnerabilities -- A Disquieting Trend?

Rowing though the backwaters may keep you more secure

Oracle 11g, AppSecInc a Go?

Security isn’t a current stumbling block for Oracle 11g and Applications Security Inc. represents a breed plugging database security gaps

Closing Security Holes with Application Scanners

Before unleashing sites and software, these products will spotlight code that can leave you vulnerable

Securing Business File Transfers

Despite the security weaknesses of FTP, there are several approaches IT can take to use the protocol safely.

Security Professionals Allege RDP Vulnerability

Security professionals claim it’s possible to bypass service-side security settings using RDP 6.0 clients.

Microsoft Pushes Non-Security Security Update

IT may need to install a memory-leak fix for Windows Installer before other security-related updates can be installed.

Why PowerTech Group Wants to Update Your AS/400 Security Model

If you have an AS/400 or iSeries, PowerTech Group wants you to update your security model—and a recent study suggests you should pay close attention

CA Updates Security Products for Enterprises Big and Small

Antivirus/antispyware package get upgrades while small and mid-size businesses get backup and migration tools

Why NAC Alone Is Not Enough

While a NAC solution blocks infected endpoints from entering the network, what happens when a connected PC becomes non-compliant?

The Verdict on Vista Security: A Mixed Bag

Symantec Corp.’s Advanced Threat Research team reports that Windows Vista does deliver tangible security improvements—but Vista is still far from invulnerable.

The Internal Security Mindset: Getting Your Head in the Game

IT is still largely unprotected from one area of enterprise risk: the insider threat.