News
Business applications
- 
				November 16, 2005
				
					16
					Nov'05
				
Step 3: GnuPG and WinPT: Setup
 - 
				November 16, 2005
				
					16
					Nov'05
				
Step 2: Public keypairs
 - 
				November 16, 2005
				
					16
					Nov'05
				
Step 4: Encrypting e-mail in WinPT
 - 
				November 14, 2005
				
					14
					Nov'05
				
Demand for development skills soars as firms seek business edge
Computer Weekly salary survey shows IT departments eager to secure skills for the future.
 
- 
			November 06, 2005
			
				06
				Nov'05
			
Hacking Windows: MSRPC vulnerabilities
In this excerpt from "Hacking Exposed, Fifth Edition: Network Security Secrets & Solutions," authors Stuart McClure, Joel Scambray and George Kurtz introduce MSRPC vulnerabilities and countermeasures.
 - 
			October 20, 2005
			
				20
				Oct'05
			
Author delves into novel attack methodologies
Review of Silence on the Wire, a book about security attack methodologies such as passive fingerprinting.
 - 
			October 19, 2005
			
				19
				Oct'05
			
Elements of a data protection strategy
In this excerpt from Data Protection and Lifecycle Management, Tom Petrocelli addresses the importance of securing data for regulatory compliance and outlines the five components of a data protection strategy.
 - 
			September 27, 2005
			
				27
				Sep'05
			
Secure your extended enterprise
How do you achieve the fine balance between ensuring that there is truly free access to sensitive information, without sacrificing security?
 - 
			September 26, 2005
			
				26
				Sep'05
			
Secure the interests of your extended enterprise
How do you achieve the fine balance between ensuring that there is truly free access to sensitive information and applications from both inside and outside the firewall, without sacrificing security?
 - 
			September 20, 2005
			
				20
				Sep'05
			
SAS drives product roundup
Serial-attached SCSI (or SAS) drives offer significant storage capacity at a much lower cost, while maintaining reasonable performance. Find out who the vendors are in this market.
 
- 
			September 18, 2005
			
				18
				Sep'05
			
CCSP courses, exam changing next month
Those seeking Cisco's security credential and specialization in VPN, firewall and IDS will soon follow different curricula that better reflect the vendor's current product lines.
 - 
			September 13, 2005
			
				13
				Sep'05
			
Ethernet users given greater product interoperability
A new network hardware testing standard will encourage enterprises, service providers and telcos to adopt cheaper and more flexible Ethernet technology for data, voice and video connectivity.
 - 
			September 05, 2005
			
				05
				Sep'05
			
IE 7.0 may usher in wave of RSS exploits
Experts warn that Web-feed enhancements in Microsoft's new Web browser may be just the thing crackers need to compromise networks and private data.
 - 
			September 05, 2005
			
				05
				Sep'05
			
Extending perimeters
The news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels.
 - 
			August 30, 2005
			
				30
				Aug'05
			
Antivirus can introduce dangerous network security holes into any OS
AV software is one of the most basic security steps available. It's also yet another gateway for security breaches.
 - 
			August 26, 2005
			
				26
				Aug'05
			
High profile breach brings security to top of agenda
There’s nothing like an apparent breach at a global company to concentrate the mind when it comes to information and data security.
 - 
			August 16, 2005
			
				16
				Aug'05
			
Reduce risks of disaster recovery testing
Untested business continuity plans can leave your firm in the lurch, but taking down live environments is risky and complicated.
 - 
			July 28, 2005
			
				28
				Jul'05
			
Sarbox compliance costing companies
Companies’ required investments to attain compliance with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum (ISF).
 - 
			July 24, 2005
			
				24
				Jul'05
			
Authentication takes a bite out of spam
Network and messaging experts offer helpful ammunition for network managers waving the white flag in the battle against spam.
 - 
			July 21, 2005
			
				21
				Jul'05
			
Users look for value boost from Microsoft licence rejig
Software Assurance needs to offer better support, say IT directors
 - 
			July 21, 2005
			
				21
				Jul'05
			
Sarbox draining corporate security budgets
Corporate investment to comply with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum (ISF).
 - 
			July 20, 2005
			
				20
				Jul'05
			
Pop quiz: E-mail security
Find out how much you know about securing your organization's e-mail.
 - 
			July 12, 2005
			
				12
				Jul'05
			
Tony Asaro: Blogs and more
Read what Tony Asaro is talking about in this month's blog, and listen to him speak in a number of webcasts.
 - 
			July 12, 2005
			
				12
				Jul'05
			
Sarbox challenge drains security budgets
International corporate spending on compliance with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum.
 - 
			June 05, 2005
			
				05
				Jun'05
			
Quiz: Secure Web directories and development, answer No. 1
Quiz: Secure Web directories and development, answer No. 1
 - 
			June 05, 2005
			
				05
				Jun'05
			
Quiz: Secure Web directories and development, answer No. 2
Quiz: Secure Web directories and development, answer No. 2
 - 
			June 04, 2005
			
				04
				Jun'05
			
Life at the edge part 2: Divide and conquer with DMZs
Learn how a DMZ works and how it can protect Web servers.
 - 
			June 03, 2005
			
				03
				Jun'05
			
Quiz: Identify and analyze Web server attacks
Test your knowledge of the material covered in the "Identify and analyze Web server attacks" section of Intrusion Defense School.
 - 
			May 31, 2005
			
				31
				May'05
			
Network configuration: IIS SMTP mail relay service and Microsoft Exchange Server
Learn how to use the IIS SMTP mail relay service to prevent spammers from directly interacting with your Microsoft Exchange Server.
 - 
			March 21, 2005
			
				21
				Mar'05
			
Linux lags Windows in new security report
A controversial research paper takes a critical look at two popular platforms' track record on vulnerabilities and fixes. In turn, its findings are facing sharp scrutiny as well.
 - 
			March 21, 2005
			
				21
				Mar'05
			
Home Office waits for police database case
Second Bichard report reveals concerns about a lack of progress and buy-in from forces around England and Wales for the national...
 - 
			March 16, 2005
			
				16
				Mar'05
			
RootkitRevealer turns root kits' tactics back at them
A contributor reviews freeware RootkitRevealer from Sysinternals.
 - 
			March 13, 2005
			
				13
				Mar'05
			
Security Bytes: Turning servers into 'malcode pushers'
In other news, 'antispyware' company shut down during investigation and new Java Trojan hits alternative browsers.
 - 
			March 08, 2005
			
				08
				Mar'05
			
Small businesses targeted with RFID
 - 
			March 08, 2005
			
				08
				Mar'05
			
A sound architecture involves both strong technology and a professional approach
Although many large organisations need to respond rapidly to changes in the market as well as to competition and globalisation...
 - 
			February 17, 2005
			
				17
				Feb'05
			
Do you speak geek: All hail e-mail!
Test your knowledge of e-mail security with this quiz.
 - 
			February 03, 2005
			
				03
				Feb'05
			
Expect 13 Windows patches, some critical
Microsoft will release patches Tuesday to fix critical security holes in Windows Media Player, MSN Messenger, Microsoft Office and Visual Studio.
 - 
			December 20, 2004
			
				20
				Dec'04
			
Fixes, workaround for Kerberos 5 vulnerability
A security hole could be exploited to launch malicious code. But there are fixes and a workaround.
 - 
			December 09, 2004
			
				09
				Dec'04
			
Data storage history quiz
We tend to take storage for granted these days, and expect bigger, better and faster performance out of our hardware and software. But did you know that storage has a long and illustrious history that started out not so big or so fast? Take our data...
 - 
			November 12, 2004
			
				12
				Nov'04
			
NTFS permissions
This excerpt from Chapter 5 of "The definitive guide to Windows 2000 security" discusses the advantages of using NTFS for access control.
 - 
			October 31, 2004
			
				31
				Oct'04
			
Fast Guide: Storage Management
Managing your storage infrastructure has never been harder. Complex systems, unbelievable data growth rates and squabbling vendors are just a few of the issues hampering your ability to manage storage. This Fast Guide to storage management has ...
 - 
			October 28, 2004
			
				28
				Oct'04
			
MoD may write off £200m Chinook helicopters
The Ministry of Defence could write off more than £200m spent on eight Chinook Mk3 helicopters.
 - 
			September 23, 2004
			
				23
				Sep'04
			
Multiple strategies guard youth services agency
Major corporations aren't the only ones who need to protect confidential information, ward off spam and malware, and defend against intrusion. Local youth service agencies must do the same, with far smaller budgets.
 - 
			August 27, 2004
			
				27
				Aug'04
			
Over-specify when buying low cost replacement for Frame Relay
A project manager reveals how a VPN saved £275,000 a year
 - 
			July 28, 2004
			
				28
				Jul'04
			
Automated SQL injection: What your enterprise needs to know
The second of a two-part interview with SPI Dynamics CTO Caleb Sima tells what you should fear, why and what you can do to mitigate your risk.
 - 
			July 25, 2004
			
				25
				Jul'04
			
Know Your Enemy -- Learning about Security Threats: Chapter 8, Legal Issues
Find out more about the legal issues swirling around the use of Honeypots.
 - 
			July 18, 2004
			
				18
				Jul'04
			
Enterprise-class RAID functions, part 2: N-way mirroring, splitting and more
With the convergence of RAID and lower-priced storage technologies, advanced RAID functions can be enjoyed by any small-to-medium sized organization with critical data.
 - 
			July 09, 2004
			
				09
				Jul'04
			
Old Mutual rolls out web reporting software to meet new regulations
Financial services group Old Mutual has rolled out web-based reporting software across its business worldwide to consolidate data...
 - 
			June 21, 2004
			
				21
				Jun'04
			
Users at risk after web host attack
Users have been warned to brace themselves for attacks on sites which provide patch downloads and web hosting services.
 - 
			May 10, 2004
			
				10
				May'04
			
'Whispering keyboards' could be next attack trend
An IBM researcher's found a way to lift passcodes and other sensitive data by recording the sound of keystrokes.
 
