Security

Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.

Featured Stories

Articles about Security

P2P File Sharing Policy

Tech Pro Research's P2P File Sharing Policy can help you provide guidelines for the proper use of P2P file sharing.You can download the policy template and use it as is or modify it to suit your needs.The...

from Tech Pro Research

Industrial Light and Magic's brilliant pirate master

ILM's visual effects supervisor oversees all the gruesome characters and supernatural transformations you see in the Pirates of the Caribbean: Dead Man's Chest. Those effects have earned a 2007 Oscar nomination. Meanwhile, John Knoll is facing an April deadline for scenes to be in the next installment: Pirates of the Caribbean: At Worlds End. CNET's Veronica Belmont got to talk with Knoll in his office the day after the nomination was announced.

January 25, 2007 by in Security

Compliance & data security

Sponsored: To comply with federal regulations such as the Sarbanes-Oxley Act, enterprises need to make sure their financial data is reliable, and thus secure. Paul Needham, Oracle's director of product management for database security, says organizations should focus on five key areas to improve data security.The content for this video was sponsored and provided by Oracle.

November 22, 2006 by in Security

Identity Management 101

With the growth of e-business, many organizations are faced with thechallenge of managing secure access to data and applications across a widerange of computing systems. Jasuja, vice president of product managementat Oracle, discusses the building blocks of an identity management system andthe keys to choosing the right solution.The content for this video was sponsored and provided by Oracle.

November 22, 2006 by in Security

Identity Management & Sarbanes Oxley

Sponsored: Identity management not only enhances security, but it can improve compliance with the Sarbanes-Oxley Act. Rohit Gupta, the director of Oracle'sID management & security products, explains how this is achieved.The content for this video was sponsored and provided by Oracle.

November 22, 2006 by in Security

Security Bites: Firefox 2 beats IE 7

Unless you've been living under a rock, you know that Mozilla unleashed Firefox 2 this week. Although the new browser is not a giant leap from version 1.5, it does beat Microsoft's Internet Explorer 7 in several aspects, including security, say CNET News.com's Joris Evers and CNET.com's Robert Vamosi on this week's Security Bites.

October 27, 2006 by in Security

Hackers vs. Firefox

From the ToorCon hacker conference in San Diego: Jesse Ruderman, a Mozilla security staffer, urges Mischa Spiegelmock and Andrew Wbeelsoi not to use possible flaws in the Web browser to build botnets. (Video courtesy of Media Archives.)

October 2, 2006 by in Security

Most Popular