News

IT management

  • June 01, 2005 01 Jun'05

    Zombie machines used in 'brutal' SSH attacks

    IT managers use SSH to gain secure access to remote computers. Hackers are using it to crack your network, with help from their zombie friends.

  • May 29, 2005 29 May'05

    Patching resource kit

    From vulnerability scanning to patching flubs, here's a collection of other helpful resources to ensure your patching efforts are effective.

  • May 23, 2005 23 May'05

    Pre-CISSP: Options for the security newbie

    Shon Harris advises novice security practitioners on the value of entry-level certifications -- and good, old-fashioned experience -- in preparation for the CISSP®.

  • May 17, 2005 17 May'05

    Should the government define spyware?

    Who's best qualified to define what is and isn't spyware -- your congressman or your online user community? Security experts say no entity can do it alone.