Security Wire Weekly:

Threat Monitor


February 4, 2010  2:34 PM

Server Message Block Version 2 security in question: Disable or patch?



Posted by: Jessica Scarpati
Threat Monitor

Threat Monitor Nick Lewis reviews the recent vulnerability discovered in a popular Windows file-sharing and printing protocol. Yes, there's a patch,...

January 21, 2010  2:33 PM

Preparing for future security threats, evolving malware



Posted by: Jessica Scarpati
Threat Monitor

Threat Monitor Security expert Nick Lewis predicts how infosec threats will evolve in 2010. Luckily, enterprise defenses will evolve, too.


January 12, 2010  1:57 PM

Buffer overflow tutorial: How to find vulnerabilities, prevent attacks



Posted by: Jessica Scarpati
Threat Monitor

Threat Monitor Buffer overflow exploits and vulnerabilities can lead to serious harm to corporate Web applications, as well as embarrassing and costly data security breaches and...


December 21, 2009  2:56 PM

How to prevent memory dump attacks



Posted by: Jessica Scarpati
Threat Monitor

Threat Monitor Because databases are often encrypted, some attackers have switched to memory dump attacks. Michael Cobb explains how to protect your unencrypted transactions.


December 7, 2009  2:57 PM

Best practices for (small) botnets



Posted by: Jessica Scarpati
Threat Monitor

Threat Monitor Your enterprise might have a strategy to deal with a large-scale botnet attack, but how would you deal with a micro-botnet that knows how to bypass antivirus and...


November 24, 2009  2:32 PM

Cut down on calls to help desk with cybersecurity awareness training



Posted by: Jessica Scarpati
security awareness training, Threat Monitor

Threat Monitor It's no secret that human error accounts for many security blunders. But what's the best way to implement cybersecurity awareness training in your enterprise to keep...


October 1, 2009  7:08 PM

Threat Monitor: An enterprise strategy for Web application security threats



Posted by: Jessica Scarpati
Threat Monitor

People Security founder Hugh Thompson reviews the tools and tactics, from routine assessments to Web application firewalls, that are essential to an application security strategy,


August 21, 2009  2:44 PM

Cyberwarfare and the enterprise: Is the threat real?



Posted by: Jessica Scarpati
Threat Monitor

Threat Monitor Recently, there has been a great deal of press about massive botnets and killer denial-of-service attacks. So how concerned should you really be about cyberwarfare? The...


July 16, 2009  2:40 PM

Software security threats and employee awareness training



Posted by: Jessica Scarpati
Threat Monitor

Threat Monitor How secure is the software produced today? Is it possible to keep attackers out of your network if they're determined to get in? What strategies for employee security...


July 6, 2009  3:16 PM

How to defend against rogue DHCP server malware



Posted by: Jessica Scarpati
Threat Monitor

Threat Monitor Rogue DHCP server malware is a new twist on an old concept. The good news is that effective threat mitigation strategies exist; the bad news is that many organizations...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: