News
Enterprise software
-
July 12, 2005
12
Jul'05
Tony Asaro: Blogs and more
Read what Tony Asaro is talking about in this month's blog, and listen to him speak in a number of webcasts.
-
July 12, 2005
12
Jul'05
Sarbox challenge drains security budgets
International corporate spending on compliance with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum.
-
July 06, 2005
06
Jul'05
PING with Karen Worstell
The Microsoft CISO discusses how she keeps Redmond and its products secure.
-
June 05, 2005
05
Jun'05
Quiz: Secure Web directories and development, answer No. 1
Quiz: Secure Web directories and development, answer No. 1
-
June 05, 2005
05
Jun'05
Quiz: Secure Web directories and development, answer No. 2
Quiz: Secure Web directories and development, answer No. 2
-
June 04, 2005
04
Jun'05
Life at the edge part 2: Divide and conquer with DMZs
Learn how a DMZ works and how it can protect Web servers.
-
June 03, 2005
03
Jun'05
Quiz: Identify and analyze Web server attacks, answer No. 4
Quiz: Identify and analyze Web server attacks, answer No. 4
-
June 03, 2005
03
Jun'05
Quiz: Identify and analyze Web server attacks
Test your knowledge of the material covered in the "Identify and analyze Web server attacks" section of Intrusion Defense School.
-
June 03, 2005
03
Jun'05
Quiz: Identify and analyze Web server attacks, answer No. 2
Quiz: Identify and analyze Web server attacks, answer No. 2
-
May 31, 2005
31
May'05
Network configuration: IIS SMTP mail relay service and Microsoft Exchange Server
Learn how to use the IIS SMTP mail relay service to prevent spammers from directly interacting with your Microsoft Exchange Server.
-
March 21, 2005
21
Mar'05
Linux lags Windows in new security report
A controversial research paper takes a critical look at two popular platforms' track record on vulnerabilities and fixes. In turn, its findings are facing sharp scrutiny as well.
-
March 21, 2005
21
Mar'05
Home Office waits for police database case
Second Bichard report reveals concerns about a lack of progress and buy-in from forces around England and Wales for the national...
-
March 16, 2005
16
Mar'05
RootkitRevealer turns root kits' tactics back at them
A contributor reviews freeware RootkitRevealer from Sysinternals.
-
March 13, 2005
13
Mar'05
Security Bytes: Turning servers into 'malcode pushers'
In other news, 'antispyware' company shut down during investigation and new Java Trojan hits alternative browsers.
-
March 08, 2005
08
Mar'05
Small businesses targeted with RFID
-
March 08, 2005
08
Mar'05
A sound architecture involves both strong technology and a professional approach
Although many large organisations need to respond rapidly to changes in the market as well as to competition and globalisation...
-
March 07, 2005
07
Mar'05
Windows vulnerable to LAND attack
Security researchers say this type of attack leaves enterprise customers of popular Windows products open to a denial of service. There is good news, though.
-
February 22, 2005
22
Feb'05
Accommodating arrays
Modern storage arrays offer disk types to meet any need -- costly Fibre Channel (FC) disks for high-end applications requiring superior performance and availability, and lower-priced SATA disks for less-critical data. The arrays also come with mixed...
-
February 17, 2005
17
Feb'05
Do you speak geek: All hail e-mail!
Test your knowledge of e-mail security with this quiz.
-
February 03, 2005
03
Feb'05
Expect 13 Windows patches, some critical
Microsoft will release patches Tuesday to fix critical security holes in Windows Media Player, MSN Messenger, Microsoft Office and Visual Studio.
-
December 20, 2004
20
Dec'04
Fixes, workaround for Kerberos 5 vulnerability
A security hole could be exploited to launch malicious code. But there are fixes and a workaround.
-
December 19, 2004
19
Dec'04
Security Bytes: Be aware of Google Desktop 'glitch'
Cisco acquires Protego; Hotmail switches to Trend Micro; Red Hat, Mandrakesoft and Gentoo fix flaws.
-
December 09, 2004
09
Dec'04
Data storage history quiz
We tend to take storage for granted these days, and expect bigger, better and faster performance out of our hardware and software. But did you know that storage has a long and illustrious history that started out not so big or so fast? Take our data...
-
November 12, 2004
12
Nov'04
NTFS permissions
This excerpt from Chapter 5 of "The definitive guide to Windows 2000 security" discusses the advantages of using NTFS for access control.
-
October 31, 2004
31
Oct'04
Fast Guide: Storage Management
Managing your storage infrastructure has never been harder. Complex systems, unbelievable data growth rates and squabbling vendors are just a few of the issues hampering your ability to manage storage. This Fast Guide to storage management has ...
-
October 28, 2004
28
Oct'04
MoD may write off £200m Chinook helicopters
The Ministry of Defence could write off more than £200m spent on eight Chinook Mk3 helicopters.
-
September 23, 2004
23
Sep'04
Multiple strategies guard youth services agency
Major corporations aren't the only ones who need to protect confidential information, ward off spam and malware, and defend against intrusion. Local youth service agencies must do the same, with far smaller budgets.
-
September 22, 2004
22
Sep'04
Security Bytes: New .jpg attack imminent; CA agrees to pay $225 million for federal violations
Sanjay Kumar is indicted for securities fraud and conspiracy, while Authorize.Net is knocked offline by massive DDoS attacks.
-
August 27, 2004
27
Aug'04
Over-specify when buying low cost replacement for Frame Relay
A project manager reveals how a VPN saved £275,000 a year
-
August 24, 2004
24
Aug'04
Latest worm uses IM to lure victims
A version of the worm which spread from infected Microsoft Internet Information Services (IIS) web servers in June has been...
-
July 28, 2004
28
Jul'04
Automated SQL injection: What your enterprise needs to know
The second of a two-part interview with SPI Dynamics CTO Caleb Sima tells what you should fear, why and what you can do to mitigate your risk.
-
July 25, 2004
25
Jul'04
Know Your Enemy -- Learning about Security Threats: Chapter 8, Legal Issues
Find out more about the legal issues swirling around the use of Honeypots.
-
July 18, 2004
18
Jul'04
Enterprise-class RAID functions, part 2: N-way mirroring, splitting and more
With the convergence of RAID and lower-priced storage technologies, advanced RAID functions can be enjoyed by any small-to-medium sized organization with critical data.
-
July 09, 2004
09
Jul'04
Old Mutual rolls out web reporting software to meet new regulations
Financial services group Old Mutual has rolled out web-based reporting software across its business worldwide to consolidate data...
-
June 21, 2004
21
Jun'04
Users at risk after web host attack
Users have been warned to brace themselves for attacks on sites which provide patch downloads and web hosting services.
-
June 01, 2004
01
Jun'04
Startup steals a win with thin provisioning
The Allant Group chose 3Pardata for its thin provisioning software, while dirty sales tactics kept EMC out of the deal.
-
May 10, 2004
10
May'04
'Whispering keyboards' could be next attack trend
An IBM researcher's found a way to lift passcodes and other sensitive data by recording the sound of keystrokes.
-
April 19, 2004
19
Apr'04
UK clearing house joint venture to provide online payment service
UK clearing house Bacs has embarked on a joint venture with a US software company to provide an online bill presentation and...
-
April 15, 2004
15
Apr'04
Bacs launches online billing service
UK clearing house Bacs has embarked on a joint venture with a US software company to provide an online bill presentation and...
-
March 28, 2004
28
Mar'04
Software Forensics: Chapter 2 -- The Players: Hackers, Crackers, Phreaks, and Other Doodz
Read Chapter 2, Players: Hackers, Crackers, Phreaks, and Other Doodz, from the book "Software Forensics" written by Robert M. Slade.
-
February 23, 2004
23
Feb'04
Somerfield speeds up product development with online system
Supermarket chain Somerfield will this week go live with the first stage of an initiative to computerise its new product...
-
October 27, 2003
27
Oct'03
Council migrates to web enabled benefits system
Liverpool City Council has completed a six-week data migration project to get its £5m housing benefit and council tax system up...
-
July 18, 2002
18
Jul'02
MoD will defy Lords and MPs and stand by Chinook verdict
The Ministry of Defence will defy two Parliamentary select committees next week by formally backing the verdict of negligence...
-
July 18, 2002
18
Jul'02
EMC and HP allow mix and match storage
Rivals EMC and Hewlett-Packard have agreed to expand a cross-licensing agreement for certain storage system application...
-
July 02, 2002
02
Jul'02
FTC suggests search sites disclose deals
The Federal Trade Commission (FTC) has suggested that search engine Web sites tell users when they are taking money from other...
-
June 05, 2002
05
Jun'02
Peer urges Tony Blair to intervene over Chinook
Lord Chalfont, the head of a Parliamentary campaign to clear the names of two pilots blamed for a Chinook helicopter crash in...
-
March 10, 2002
10
Mar'02
September 11: How Merrill Lynch recovered
Merrill Lynch lost two data centres during the 11 September terrorist attacks in New York. The site is now functioning as a...
-
August 24, 2001
24
Aug'01
HP gambles on Itanium
A top Hewlett-Packard executive has signalled his company's commitment to Intel Itanium processor in perhaps the strongest terms...
-
August 22, 2001
22
Aug'01
Intel's open source warning for Sun
Intel, the chip manufacturing giant, has warned Sun Microsystems that the economic slowdown could drive many enterprises to use...
-
March 13, 2001
13
Mar'01
Government trials digital signatures on mobile phones