×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.

News - Article Archives - Page 434

Interview With Homeland Security CIO, Part 2

June 05, 2002 |
In Part 2 of CIN's interview with the Homeland Security CIO, Steven Cooper discusses strategies and best practices for cyber security and homeland defense, as well as the importance of change management. (Click here to read Part 1.)
READ MORE

Homeland Security CIO: Information (Sharing) Is Power

June 04, 2002 |
In a two-part interview, Office of Homeland Security CIO Steven Cooper discusses the many significant challenges facing him at the newly created federal department charged with combating terrorism.
READ MORE

Network Security: Covering the Basics

June 03, 2002 |
Everyone loves a good security horror story when it's someone else's security that's horrifying. Sticking to some basics can ease your fears about your own network while others swap war stories. First in a series.
READ MORE

'Critical' Exploit Detected in Exchange 2000

May 30, 2002 |
Microsoft issues a patch for bugs within Microsoft Exchange 2000 e-mail servers that could cause denial of service attacks.
READ MORE

Major Cause Of Spam: Your Employees

May 30, 2002 |
A new study by a network security company shows that employees misusing their Internet connections on the job are forging a path for spam to flood into their companies' inboxes. But some say that's tantamount to blaming the victim.
READ MORE

Aberdeen Insight: Security Policy Automation In The Enterprise

May 30, 2002 |

An evolution under way in the security software industry is allowing enterprises to cost-effectively define, detect, deploy, and document consistent security programs. The Aberdeen Group explains what emerging security policy automation tools can do for your network.

READ MORE

Simplify, Save With Single Sign-On

May 29, 2002 |
Single sign-on has evolved as a cost-savings solution to minimize support calls and to simplify the administrative process of authentication and authorization. Here's a look at how it works.
READ MORE

Secure Your Network Against Viruses, Spam

May 28, 2002 |
Are you doing enough to control the viruses and spam coming in across your mail servers? Here are some tips for protecting your enterprise from virus attacks and spam tsunamis.
READ MORE

Microsoft Battles Debugger Flaw, SQL Worm

May 23, 2002 |
Vulnerabilities with Windows NT and 2000 systems and a self-propagating 'Spida Worm' add to the security headaches for Microsoft.
  • MS Gets Defensive About Open Source Software
  • READ MORE

    Security In eBusiness Era Focus Of Conference

    May 21, 2002 |
    At next week's eSecurity Conference & Expo in Virginia, security experts from the private sector, government and academia will focus on helping attendees develop effective strategies and policies for protection in the eBusiness era.
    READ MORE

    How To Get The Most Out Of Your Security Software

    May 15, 2002 |
    Sidebar: Before companies invest more of their budgets on new security technologies, they should make sure they're properly using what they already have, say industry analysts and security consultants.
    READ MORE

    Security Sieves: Misused Technology Leaving Networks Vulnerable

    May 15, 2002 |
    Despite the big money IT executives are spending to protect their companies from security breaches, industry analysts and security consultants say most are misusing the technology they already have installed.
    READ MORE

    FBI Nabs DeceptiveDuo

    May 15, 2002 |
    UPDATE: FBI confirms raids on the hacking team that gained notoriety breaking into federal databases and defacing government Web sites; equipment seized.
  • Navy Brass Latest Hacking Victim
  • DeceptiveDuo Strikes Again
  • Airline Database Posted On Defacement
  • READ MORE

    CERT Warns Of DHCP Threat

    May 15, 2002 |
    The CERT Coordination Center is warning of a vulnerability in Dynamic Host Configuration Protocol (DHCP) servers that could enable an intruder to gain root access to the servers.
    READ MORE

    Navy Brass Latest Hacking Victim

    May 14, 2002 |
    Despite hitting that branch of the military two weeks ago, the now-infamous Deceptive Duo was able to re-enter U.S. Navy Web servers to wreak further havoc.
    READ MORE

    Social Engineering: The Human Side Of Hacking

    May 10, 2002 |
    Companies spend millions of dollars on firewalls, authentication processes and network monitoring software, but few bother to train employees how to avoid being duped into giving away critical information.
    READ MORE

    How To Thwart The 'Social Engineers'

    May 10, 2002 |
    Sidebar: Security experts from both government and the private sector offer suggestions to protect your company from hackers using social engineering techniques to break into computer networks.
    READ MORE

    The Feds' Top Hacker Speaks

    May 10, 2002 |
    Sidebar: Keith Rhodes, chief technologist with the U.S. General Accounting Office, makes his living breaking into government networks to find and eliminate security flaws. In this Q&A, he discusses what companies should be doing to protect themselves, what risks are looming ahead and what exciting security technology is coming down the road.
    READ MORE

    Computer Worms Costing Billions Globally

    May 07, 2002 |
    Emails no doubt have revolutionized our lives on a personal and business level. But they also have become a deadly vehicle for transporting worms and viruses to our networks.
    READ MORE

    Security Flaw Found In Sun Solaris Servers

    May 02, 2002 |
    The CERT Coordination Center warns it has discovered serious holes in some Sun Microsystems servers that might allow intruders to execute code.
    READ MORE