China Telecom debacle exposes Internet's biggest vulnerability

November 23, 2010
Shortcomings in Border Gateway Protocol enabled sensitive data to be rerouted to China, yet no changes will likely be made
Read more »

End-users with admin-level access put your network security at risk

November 16, 2010
Granting end-users elevated-access accounts yields security risks -- but there are tactics to reduce the threat
Read more »

Five password-security myths dispelled

November 09, 2010
Passwords are a critical line of defense between your sensitive data and prying eyes, so separating fact from fiction about password security is a must
Read more »

Androids and iPads: Network security's last stand?

November 02, 2010
You're damned if you allow consumer devices, and damned if you don't; either way, establish security policies now
Read more »

Protect your network security: How to get rid of advanced persistent threats

October 26, 2010
Eradicating entrenched APT hackers requires catching them off guard with careful, stealthy planning
Read more »

How advanced persistent threats bypass your network security

October 19, 2010
Quick-hit hackers may grab the money/data and run, but APT rogues hunker down and steadily mine your sensitive data
Read more »

Sowing the seeds for a safer Internet

October 12, 2010
Services from Google, Comcast, and Microsoft could lay foundation for worldwide warning system to quash malware
Malware
Read more »

Stuxnet: Smarter -- and deadlier -- than the average worm

October 05, 2010
Stuxnet's purpose isn't entirely clear, but whoever created it knew what they were doing
Malware
Read more »

For better security, ditch the automatic tools

September 28, 2010
Automated scanning tools have their place, but plenty of threats can only be found with an old-fashioned manual search
Read more »

Don't let company politics dictate your security priorities

September 21, 2010
When the network is compromised, address the most pressing risk first -- for the sake of your company and your career
Read more »
©1994-2014 Infoworld, Inc.