Expert analysis
OpenSSH Buffer Management Vulnerability
Early today we received a note that there are rumblings in the underground related to a new OpenSSH vulnerability. The official web site says that a new version of OpenSSH was …
Wireless Security: Preventing Your Data From Vanishing Into Thin Air
Despite its many exciting possibilities for new business opportunities, cost-savings, and user freedom, wireless technology presents serious challenges to information …
An Integrated Approach to Threat Management
Effective Threat Management embodies the actions organizations must take to defend themselves against today’s ever-present cyber-threats. At a high-level, these actions …
A Walk Through “Sombria”: A Network Surveillance System
Sombria (“shadowy” in Portuguese) is a honeypot system set up in Tokyo, Japan, that is intended for network surveillance and research and not for production …
Interview with John Vacca, information technology consultant and internationally known author
John Vacca is an information technology consultant and internationally known author based in Pomeroy, Ohio. Since 1982, John has authored of 30 books and more than 390 …
Information Security Checklist
Today’s heightened awareness of the need to secure IT infrastructures and protect mission critical data is leading more and more organizations to reevaluate their …
Protecting Databases
One of the more recent evolutions in network security has been the movement away from protecting the perimeter of the network to protecting data at the source. The reason …
Prison for computer crime
The Justice Ministers of the 15 Member States of the European Union have decided to modify their country laws, with the aim of including prison sentences for the authors of …
Blindfolded SQL Injection
Until today, exploiting SQL Injection attacks depended on having the Web Server return detailed error messages or having any other source of information. As a result, many …
SCO vs. IBM
SCO’s lawsuit against IBM and SCO’s demanding money from companies using Linux has caused some using Linux to worry that this wonderful “too good to be …
St. Bernard Announces E-mail Filtering Appliance
San Diego based St. Bernard Software Inc., announced ePrism Mail Filter – their new e-mail filtering appliance featuring a full combo of e-mail security, spam …
NIST to Host a Biometrics Conference
The National Institute of Standards and Technology is holding the Biometric Consortium’s fall conference, BC 2003, to showcase recent advances in the field and examine …