Granted, a degree of hyperbole might exist in the above statements but then again it is not entirely far from …
Heartland data breach could be bigger than TJX’s
A data breach disclosed Tuesday by Heartland Payment Systems may well displace TJX Companies' January 2007 breach in the record …
Top 25 software screw-ups
Most IT security woes, from software patching to cyberespionage and cybercrime, can be traced to the devastating effects wrought by …
Tracking indentities
A common misconception concerning network security is that the enterprise network is at considerable risk from external attackers only. In …
Symantec report reveals booming underground economy
Symantec has released its “Report on the Underground Economy” and it details an online underground economy that has matured into …
Firefox extension blocks dangerous Web attack
‘NoScript’ is a small application that integrates into Firefox. It blocks scripts in programming languages such as JavaScript and Java …
Fortinet debuts database vulnerability assessment appliance
The FortiDB-1000B appliance is a mid-enterprise product designed to “harden” databases by detecting weaknesses in passwords, access privileges and configuration …
Fighting threats on every front
The threats to a corporation's security are changing so quickly that it is difficult to determine what steps are required …