MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
CIO
November 1, 2003
Scott Berinato
FrankenPatch The more you patch, the more you need to patch, and the more kludgy and terrifyingly unpredictable your systems and applications become. Is there any way to escape this horror? mark for My Articles similar articles
PC Magazine
December 30, 2003
Matthew D. Sarrel
Network Security: Know Your Weaknesses Vulnerability scanners identify your network's insecurities. Which one of these 6 tested products will watch your back? mark for My Articles similar articles
HBS Working Knowledge
June 30, 2003
Austin & Darby
Computer Security is For Managers, Too Computer security isn't just an IT headache, say two Harvard professors. Here are eight to-do items for managers to protect their digital assets. mark for My Articles similar articles
InternetNews
February 20, 2007
Clint Boulton
Douse Application Security Flaws With Watchfire Watchfire's AppScan Enterprise 5 allows developers to point and click to analyze applications for vulnerabilities. mark for My Articles similar articles
T.H.E. Journal
February 2009
John K. Waters
IT Security: Target: The Web No longer focused on the network, hackers have a bull's eye now trained squarely on web-based applications. What, if anything, can school districts do to thwart them? mark for My Articles similar articles
PC World
November 2001
Kim Zetter
PC Security: Holey Software! New security bugs appear weekly, letting hackers attack your data. Here's why apps are so full of holes and how you can protect yourself... mark for My Articles similar articles
InternetNews
March 16, 2004
Ryan Naraine
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. mark for My Articles similar articles
InternetNews
July 31, 2006
Clint Boulton
SQL Injection Threatens to Needle Web Users A scripting flaw that lets perpetrators pull any content from a database is a scary tool for IT admins. mark for My Articles similar articles
Fast Company
October 2003
Bill Breen
Can Microsoft Finally Kill All The Bugs? Viruses, flaws, and worms, oh my! With PCs crashing and the Internet wheezing, Gates & Co. are on the quality hot seat. We'll take you inside Microsoft's effort to get its software right, right from the start. mark for My Articles similar articles
Wall Street & Technology
February 14, 2006
Leslie Kramer
Security Begins at the Start The lack of attention given security vulnerabilities during software development remains a big problem for financial firms. mark for My Articles similar articles
PC World
December 20, 2001
Matt Berger
Windows Patch Plugs 'Critical' Holes Microsoft issues a fix for a major flaw -- kept secret for five weeks -- that leaves Windows XP, Me, and some 98 systems vulnerable when online... mark for My Articles similar articles
JavaWorld
July 2001
Todd Sundsted
Secure your Java apps from end to end, Part 2 Little mistakes during application development often lead to big security problems for developers and users. This article introduces the most common types of design and implementation flaws that turn into security vulnerabilities and describes how to avoid them... mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
PC World
March 2006
Andrew Sullivan
Programs in Peril Popular applications have more security flaws than Windows does. mark for My Articles similar articles
PC World
March 2001
Stuart J. Johnston
PC Pest Control Exterminate your system's bugs with this essential toolkit... mark for My Articles similar articles
CIO
March 1, 2007
Allan Holmes
Bad Neighborhood Many mid-market enterprises say they have neither the time, money nor resources to spend on security. Which may be why the crooks are targeting them. mark for My Articles similar articles
PC World
May 2003
Daniel Tynan
Dawn of the Superworm Experts warn that the Slammer worm is a harbinger of worse strains to come. mark for My Articles similar articles
InternetNews
February 5, 2004
Ryan Naraine
'Critical' RealPlayer Holes Patched RealNetworks patches its flagship media player to fix cross site scripting and system access security vulnerabilities. mark for My Articles similar articles
InternetNews
February 24, 2004
Jim Wagner
Microsoft Beta Includes Built-in Virus Scanner Intent on stopping the spread of Internet viruses, the software giant pilots a new tool for its Windows XP Service Pack 2 and reaches out to ISVs. mark for My Articles similar articles
PC Magazine
March 1, 2006
Matthew D. Sarrel
Hack Thyself Discovering security flaws is the first step toward getting your small business's computers in shape. mark for My Articles similar articles
CIO
August 1, 2003
Bob Violino
Patching Things Up The latest patch management tools can help reduce costs and increase reliability. mark for My Articles similar articles
InternetNews
July 28, 2009
Microsoft Pounces on IE, Visual Studio Flaws Company hurries out patches as details of the flaws are set to go public. mark for My Articles similar articles
CIO
April 15, 2004
Eric Knorr
Guard the Application Layer Firewalls alone are no longer enough to protect your online assets mark for My Articles similar articles
PC World
November 2004
Harry McCracken
Is This Any Way to Fix Security Holes? How today's software patching process actually helps hackers do their job. mark for My Articles similar articles
PC World
February 2002
Stuart J. Johnston
Bugs and Fixes: Don't Share Cookies With Strangers Grab fixes for the latest flaws in Internet Explorer and Windows Media Player... mark for My Articles similar articles
CIO
October 1, 2003
Art Jahnke
Should Software Vulnerabilities Be Posted Online? Readers weigh in with their opinions on this thorny issue. mark for My Articles similar articles
InternetNews
May 4, 2005
Tim Gray
Apple's Patch Slew Apple Computer addresses a number of Mac OS X operating system vulnerabilities with its latest security update. mark for My Articles similar articles
PC Magazine
February 1, 2006
Robert Lemos
Beating Microsoft to the Patch Community-led efforts sometimes deliver security fixes before developers. mark for My Articles similar articles
InternetNews
June 14, 2005
Jim Wagner
Microsoft Plugs 10 on Patch Tuesday Microsoft announced patches to correct vulnerabilities addressed in 10 security bulletins, three of them critical. mark for My Articles similar articles
Bank Systems & Technology
July 22, 2007
Nancy Feig
Bank's IT Security Vulnerability Growing Improvements in overall security have been achieved in most industry sectors, but the financial services industry has seen an increase in the average number of IT vulnerabilities, according to to a study. mark for My Articles similar articles
InternetNews
February 2, 2007
Clint Boulton
Caleb Sima, CTO, SPI Dynamics Web application security gets a boost with Project Phoenix from SPI Dynamics. mark for My Articles similar articles
InternetNews
April 12, 2005
Michael Singer
Oracle Security Updates Include PeopleSoft Fixes The company issued 15 separate patches for multiple security vulnerabilities, but older flaws still loom. mark for My Articles similar articles
Bank Technology News
August 2004
Karen Krebsbach
Security Patches: Plugging The Leaks In The Dike With banks spending more than $1 billion a year to seal gaps in applications and operating systems, patch management has become one of bank CIOs' toughest headaches, according to BITS, the technology arm of the Financial Services Roundtable mark for My Articles similar articles
InternetNews
April 13, 2005
LogicLibrary Ups Devs' Real-Time QA Logiscan analyzes both in-house and commercial applications and patches with the ability to direct users to the location of the vulnerabilities within the source code. mark for My Articles similar articles
CIO
February 23, 2011
Kim S. Nash
Four Kinds of IT Professionals CIOs Need to Hire Now Developers of mobile, social media and collaboration apps. Business experts. Cloud-vendor managers. Masters of unstructured data. Why these IT professionals are essential to maintaining your company's competitive edge. mark for My Articles similar articles
InternetNews
February 15, 2005
Jim Wagner
Fortify Gauges Code Security Application Risk Analyzer provides hints to possible security leaks in C, and soon Java, code. mark for My Articles similar articles
CIO
September 15, 2002
Meridith Levinson
The Best Offense While most security dollars go to technology, CIOs in our exclusive survey say investments in staff -- and education efforts to guide them -- must back up that robust firewall. mark for My Articles similar articles
InternetNews
January 30, 2007
Clint Boulton
SPI Lets 'Phoenix' Fly For Web Security SPI Dynamics created Phoenix, a new Web application security architecture to analyze Web 2.0 applications and find previously undetectable Web flaws. mark for My Articles similar articles
CIO
April 15, 2003
The Earliest Adopter Microsoft's IT boss is the first to install, the first to deploy and the first to judge. Consequently, he's learned a little bit about rollouts. mark for My Articles similar articles
PC World
June 2005
Stuart J. Johnston
Serious Holes in Antivirus Software McAfee, Symantec, Trend Micro, and F-Secure antivirus apps are affected. mark for My Articles similar articles
CIO
June 15, 2003
Scott Berinato
A Rash of IT Failures This has been an intense six months for health-care CIOs in general, judging by some very public incidents. mark for My Articles similar articles
InternetNews
August 6, 2010
Adobe Hurries Patch for PDF Security Flaw The vulnerability in Adobe Reader could give hackers control of a user's computer. mark for My Articles similar articles
CIO
March 1, 2002
Kaplan & Prewitt
The Future - The State of the CIO Four experts agree: The job is changing, with strategic planning becoming ever more central to the CIO role... mark for My Articles similar articles
CIO
October 15, 2003
Scott Berinato
The State of Information Security 2003 The State of IT Security 2003 survey covered six continents, 54 countries and included more than 7,500 respondents. What emerged is a portrait of a new discipline taking baby steps toward defining norms and developing best practices. mark for My Articles similar articles
PC World
April 9, 2002
Matt Berger
Microsoft Helps Protect Your PC Software giant unveils a free tool that searches for security flaws in Windows-based computers... mark for My Articles similar articles
CIO
October 15, 2001
Meridith Levinson
Let's Stop Wasting $78 Billion a Year Analysts estimate that American businesses end up spending billions for software that doesn't do what it's supposed to. Some CIOs are tired of playing the sap and are beginning to take action... mark for My Articles similar articles
InternetNews
February 10, 2004
Ryan Naraine
Buffer Overflows Patched in Oracle 9i Database Oracle issues a fix for multiple vulnerabilities in its database server software. mark for My Articles similar articles
New Architect
May 2002
Amit Asaravala
Rating Security Should the government enforce higher standards for tech vendors? If certain vendors continue to distribute flawed products, we must give technology buyers the means to identify those flaws and the option to purchase truly secure products. mark for My Articles similar articles
T.H.E. Journal FYI - PatchManagement.org PatchManagement.org is designed to help IT network managers, system administrators and security professionals better understand patch management and computer security vulnerabilities. mark for My Articles similar articles
Technology Research News
June 30, 2004
Kimberly Patch
Software fuse shorts bugs Many of the problems are caused by conditions that software designers didn't anticipate. mark for My Articles similar articles