Security


Security Spending Will Top All IT Investments

IDC predicts security and business continuity spending will increase twice as fast as overall IT budgets between now and 2007.

Best Practices: Staying Ahead of International Regulations

From carrots to sticks, a variety of recent regulations has presented a challenge to security managers. We ask a security expert where U.S. and European regulations are headed.

Alert: Vulnerability in SSH

Versions of OpenSSH prior to 3.7.1 are vulnerable to denial of service attacks via a buffer management problem. We explain the problem and what you can do about it.

CERT: Best Practices for Beating Worms

CERT’s Coordination Center outlines the top steps businesses, vendors, and the government can take to arrest the onerous cycle of constant patching.

Accelerating Security Certification

Can information security professionals really get certified in half the ordinary time?

Finding Security Holes in Your Web Applications

The dot-com boom’s legacy: buggy code. How do you find those bugs? Instead of trying to do code reviews with tools that were meant for developers, it's time to do them with tools meant for security

Authentication: Three Critical Steps for Every Organization

Yankee Group predicts large growth in the authentication market. Here are three things every organization needs to do to ensure users are who they say they are.



Best Practices: Handheld Security

Handheld security expert suggests best practices for organizations that support the devices

Dirty Dozen Viruses: August was a Banner Month

Central Command shows a single virus accounted for over three-quarters of all activity last month.

Alert: “Critical” Flaw in Office, Other Microsoft Applications

Vulnerability in Microsoft applications occurs thanks to Visual Basic for Applications

Seeking the Perfect Patch Process

To avoid the patch-and-pray cycle, IT organizations need to examine how to make vulnerabilities such as Sobig seem so small.

Alerts: CiscoWorks, P2P Software Vulnerable

Cisco details vulnerabilities in CiscoWorks; eMule code hiding in P2P software

Spammers Increasing Methods to Avoid Detection

Techniques for challenging and defeating spam filters continue to grow

Vulnerabilities: IE Cross-Domain Security Flaw, Database Component Exposure

Microsoft releases a patch for IE 5.01 and above; company's Data Access Components could run hacker's code

Best Practices in Security Training

Worms and legislation dictate the need for security-savvy employees; here's how to train them and reinforce human nature.

Sobig Lives Up to Its Name

It's been a banner month for viruses, as new vulnerabilities were unleashed and others lingered

Worm Continues Blast Across Internet

Worm exploits RPC/DOM vulnerability; denial-of-service attacks still likely

Passwords and Identity: Seeking Synergy

Do password management software and identity synchronization software naturally go together? One thing's for sure: the ROI for both categories is attractive.

Alerts: BSD and Postfix Vulnerabilities; File-Sharing Dangers

New vulnerabilities in BSD operating system and Postfix, a popular mail transfer agent; the FTC warns about the dangers of file-sharing

Case in Point: Protecting the Network Edge

Japanese university finds easy way to control network access