Separate Active Directory forests don't translate into better security

September 14, 2010
Contrary to popular opinion, maintaining a separate AD forest doesn't always improve security
Read more »

Imagine a world with no cyber secrets

September 07, 2010
Once quantum computers reach their full potential, all that's encrypted will be unlocked -- and civilization as we know won't be the same
Encryption
Read more »

Escape from Windows DLL security hell

August 31, 2010
Simply avoiding certain websites and downloads won't shield you from the DLL library loading hack, but this advice will help
Read more »

Wireshark reigns among the sea of network sniffers

August 24, 2010
Open source protocol analyzer is a stalwart ally for uncovering dangerous behavior on the network
Read more »

Cloud security 101: Start cramming now

August 17, 2010
Cloud computing represents a major shift in the way you do IT security, so you'd best bone up in the name of job security
Security, IaaS, SaaS
Read more »

Don't bury your head in a security sandbox

August 10, 2010
Long-term software security requires better application development practices, not sandboxes
Read more »

Waiting for an Internet security fix? Don't hold your breath

August 03, 2010
At Black Hat 2010, critical technologies such as DNS and SSL proved to be vulnerable -- and they're more than 20 years old
Security
Read more »

Google and Mozilla bug bounties don't buy much more security

July 27, 2010
Browser bugs are too prevalent and malicious hackers are too tenacious for higher monetary rewards to make a big difference
Read more »

Honeypots stick it to insider threats

July 20, 2010
Beyond stopping outside hackers and tracking malware, honeypots can weed out unauthorized insiders and partners
Read more »

Security rule No. 1: Assume you're hacked

July 13, 2010
Accept that your company's IT system have been compromised -- then get to work defending them
Read more »
©1994-2014 Infoworld, Inc.