Network Security - Article Archives - Page 263

Tips For Successful Security Outsourcing

June 06, 2002 |
Outsourcing security functions is a viable option for enterprises, but the security service provider market is still maturing, so users must exercise caution and perform due diligence before selecting a provider.
READ MORE

Cross-Platform Chaos? New Virus Infects Windows, Linux

June 05, 2002 |
Although it hasn't been unleashed on the Internet, a new virus is able to infect both Windows 32 systems and Linux operating systems, making it the first complex virus with cross-platform capabilities.
READ MORE

Is Linux Ready for National Security?

June 05, 2002 |
Is Linux more or less secure than proprietary platforms? At least one U.S. think tank says there should be a national debate and rigorous testing before it is utilized in a national security capacity.
  • 'Unbreakable Linux' Unleashed
  • READ MORE

    Network Security: Covering the Basics

    June 03, 2002 |
    Everyone loves a good security horror story when it's someone else's security that's horrifying. Sticking to some basics can ease your fears about your own network while others swap war stories. First in a series.
    READ MORE

    'Critical' Exploit Detected in Exchange 2000

    May 30, 2002 |
    Microsoft issues a patch for bugs within Microsoft Exchange 2000 e-mail servers that could cause denial of service attacks.
    READ MORE

    Major Cause Of Spam: Your Employees

    May 30, 2002 |
    A new study by a network security company shows that employees misusing their Internet connections on the job are forging a path for spam to flood into their companies' inboxes. But some say that's tantamount to blaming the victim.
    READ MORE

    Aberdeen Insight: Security Policy Automation In The Enterprise

    May 30, 2002 |
    An evolution under way in the security software industry is allowing enterprises to cost-effectively define, detect, deploy, and document consistent security programs. The Aberdeen Group explains what emerging security policy automation tools can do for your network.
    READ MORE

    Secure Your Network Against Viruses, Spam

    May 28, 2002 |
    Are you doing enough to control the viruses and spam coming in across your mail servers? Here are some tips for protecting your enterprise from virus attacks and spam tsunamis.
    READ MORE

    Microsoft Battles Debugger Flaw, SQL Worm

    May 23, 2002 |
    Vulnerabilities with Windows NT and 2000 systems and a self-propagating 'Spida Worm' add to the security headaches for Microsoft.
  • MS Gets Defensive About Open Source Software
  • READ MORE

    Security In eBusiness Era Focus Of Conference

    May 21, 2002 |
    At next week's eSecurity Conference & Expo in Virginia, security experts from the private sector, government and academia will focus on helping attendees develop effective strategies and policies for protection in the eBusiness era.
    READ MORE

    How To Get The Most Out Of Your Security Software

    May 15, 2002 |
    Sidebar: Before companies invest more of their budgets on new security technologies, they should make sure they're properly using what they already have, say industry analysts and security consultants.
    READ MORE

    Security Sieves: Misused Technology Leaving Networks Vulnerable

    May 15, 2002 |
    Despite the big money IT executives are spending to protect their companies from security breaches, industry analysts and security consultants say most are misusing the technology they already have installed.
    READ MORE

    FBI Nabs DeceptiveDuo

    May 15, 2002 |
    UPDATE: FBI confirms raids on the hacking team that gained notoriety breaking into federal databases and defacing government Web sites; equipment seized.
  • Navy Brass Latest Hacking Victim
  • DeceptiveDuo Strikes Again
  • Airline Database Posted On Defacement
  • READ MORE

    CERT Warns Of DHCP Threat

    May 15, 2002 |
    The CERT Coordination Center is warning of a vulnerability in Dynamic Host Configuration Protocol (DHCP) servers that could enable an intruder to gain root access to the servers.
    READ MORE

    Navy Brass Latest Hacking Victim

    May 14, 2002 |
    Despite hitting that branch of the military two weeks ago, the now-infamous Deceptive Duo was able to re-enter U.S. Navy Web servers to wreak further havoc.
    READ MORE

    Social Engineering: The Human Side Of Hacking

    May 10, 2002 |
    Companies spend millions of dollars on firewalls, authentication processes and network monitoring software, but few bother to train employees how to avoid being duped into giving away critical information.
    READ MORE

    How To Thwart The 'Social Engineers'

    May 10, 2002 |
    Sidebar: Security experts from both government and the private sector offer suggestions to protect your company from hackers using social engineering techniques to break into computer networks.
    READ MORE

    The Feds' Top Hacker Speaks

    May 10, 2002 |
    Sidebar: Keith Rhodes, chief technologist with the U.S. General Accounting Office, makes his living breaking into government networks to find and eliminate security flaws. In this Q&A, he discusses what companies should be doing to protect themselves, what risks are looming ahead and what exciting security technology is coming down the road.
    READ MORE

    Computer Worms Costing Billions Globally

    May 07, 2002 |
    Emails no doubt have revolutionized our lives on a personal and business level. But they also have become a deadly vehicle for transporting worms and viruses to our networks.
    READ MORE

    Security Flaw Found In Sun Solaris Servers

    May 02, 2002 |
    The CERT Coordination Center warns it has discovered serious holes in some Sun Microsystems servers that might allow intruders to execute code.
    READ MORE