Trends

Disaster Recovery: A Preparation Checklist

The terrorist attacks of Sept. 11 have taught many CIOs and CSOs one thing -- prepare for the unexpected. Dave Johnson, director of technology at Grant Thornton, a global a...

Honeypots Turn The Tables On Hackers

Honeypots are positioned to become a key tool to defend the corporate enterprise from hacker attacks, but some security watchers worry they could bring a new set of securi...

Top 10 Enterprise Security Risks

Network administrators are besieged today with a growing list of security risks, and analysts warn that too often they get caught up in battling one or two vulnerabilities a...

Pfizer Security Chief: ‘It’s All About Protecting The Business’

Steve Nyman, director of information security at Pfizer Inc., is the man in charge of protecting the research, chemical formulations and financial information at the $35 bil...

Vulnerabilities Found in Popular Web Scripting Language

By eSecurityPlanet.com StaffA vulnerability in the PHP scripting language, which is commonly used in Web site development, could enable attackers to execute code that crashe...

Primer: Developing a site security policy

The first rule of network site security is easily stated: that which is not expressly permitted is prohibited. A security policy should deny access to all network resources ...

CyberSource offers tips for protecting sensitive data

CyberSource Corp., a provider of risk management and real-time payment systems for businesses that specializes in fraud detection, has released a list of 10 tips to help e-b...

Latest articles