News

Business applications

  • October 20, 2005 20 Oct'05

    Author delves into novel attack methodologies

    Review of Silence on the Wire, a book about security attack methodologies such as passive fingerprinting.

  • October 19, 2005 19 Oct'05

    Elements of a data protection strategy

    In this excerpt from Data Protection and Lifecycle Management, Tom Petrocelli addresses the importance of securing data for regulatory compliance and outlines the five components of a data protection strategy.

  • September 27, 2005 27 Sep'05

    Secure your extended enterprise

    How do you achieve the fine balance between ensuring that there is truly free access to sensitive information, without sacrificing security?

  • September 26, 2005 26 Sep'05

    Secure the interests of your extended enterprise

    How do you achieve the fine balance between ensuring that there is truly free access to sensitive information and applications from both inside and outside the firewall, without sacrificing security?

  • September 20, 2005 20 Sep'05

    SAS drives product roundup

    Serial-attached SCSI (or SAS) drives offer significant storage capacity at a much lower cost, while maintaining reasonable performance. Find out who the vendors are in this market.

  • September 18, 2005 18 Sep'05

    CCSP courses, exam changing next month

    Those seeking Cisco's security credential and specialization in VPN, firewall and IDS will soon follow different curricula that better reflect the vendor's current product lines.

  • September 13, 2005 13 Sep'05

    Ethernet users given greater product interoperability

    A new network hardware testing standard will encourage enterprises, service providers and telcos to adopt cheaper and more flexible Ethernet technology for data, voice and video connectivity.

  • September 05, 2005 05 Sep'05

    IE 7.0 may usher in wave of RSS exploits

    Experts warn that Web-feed enhancements in Microsoft's new Web browser may be just the thing crackers need to compromise networks and private data.

  • September 05, 2005 05 Sep'05

    Extending perimeters

    The news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels.

  • August 30, 2005 30 Aug'05

    Antivirus can introduce dangerous network security holes into any OS

    AV software is one of the most basic security steps available. It's also yet another gateway for security breaches.