Similar Articles |
|
InternetNews February 14, 2011 |
Oracle Tunes Up Database Security With Firewall In a bid to shore up the security of crucial IT assets, Oracle has unveiled its Database Firewall product, which seeks to guard against SQL injections and other database attacks. |
Real Estate Portfolio Mar/Apr 2002 Scott Laliberte |
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... |
InternetNews March 16, 2004 Ryan Naraine |
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. |
PC World January 27, 2003 Williams et al. |
Spread of Slammer Worm Slows Investigators are searching for the source of the worm that caused major disruptions to Internet service over the weekend. |
CIO November 1, 2003 Scott Berinato |
FrankenPatch The more you patch, the more you need to patch, and the more kludgy and terrifyingly unpredictable your systems and applications become. Is there any way to escape this horror? |
InternetNews April 20, 2004 Ryan Naraine |
Exploit for Windows SSL Flaw Circulating Unpatched systems are at risk of DoS attacks but security experts warn the threat level could grow considerably. |
CIO October 15, 2003 Paul Roberts |
Virus Attacks What a month. Human frailty, spam and a dangerous Microsoft Windows vulnerability combined to produce four major Internet worm attacks in August. A rundown. |
InternetNews May 7, 2004 Ryan Naraine |
Analyst: Security Woes Add to Windows Cost Gartner's John Pescatore believes enterprises must include the cost of protecting Windows when considering alternatives. |
PC World August 1, 2001 James Niccolai |
Code Red Awakens With a Whimper Hyped worm appears to have little impact, but experts warn we aren't out of the woods yet... |
PC World May 2003 Daniel Tynan |
Dawn of the Superworm Experts warn that the Slammer worm is a harbinger of worse strains to come. |
InternetNews April 16, 2009 Alex Goldman |
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. |
InternetNews May 28, 2004 Sean Michael Kerner |
Financial Firms in Hackers' Crosshairs A new survey says IT security attacks on financial institutions have doubled. |
PC World August 9, 2001 Joris Evers |
Microsoft Sees Red: Worm Infects Its Own Servers Neglecting its own servers, Microsoft gets hit by the worm it urged customers to avoid... |
Wall Street & Technology January 5, 2005 David Tan |
Combating Blended Threats Security experts agree that blended threats will continue to grow in frequency, complexity and severity. |
InternetNews July 31, 2006 Clint Boulton |
SQL Injection Threatens to Needle Web Users A scripting flaw that lets perpetrators pull any content from a database is a scary tool for IT admins. |
InternetNews September 28, 2010 |
Microsoft Preps Out-of-Band Patch for ASP.NET Microsoft's latest fix resolves encryption flaw in ASP.NET framework used to create new websites. |
PC Magazine August 17, 2005 Sebastian Rupley |
Beyond Viruses The cost to U.S. companies of doing battle with network attacks has fallen significantly. |
CIO August 1, 2003 Bob Violino |
Patching Things Up The latest patch management tools can help reduce costs and increase reliability. |
PC Magazine November 11, 2003 |
The Lookout: New Critical RPC Flaws Nearly a month to the day after the Blaster worm began tearing through the Internet, Microsoft Corp. reported three newly identified flaws in the Windows RPC protocol, two of which are quite similar to the one that Blaster attacks. |
IEEE Spectrum February 2011 David Schneider |
Network Defense Gone Wrong One common distributed denial-of-service defense could in fact make a Web site more vulnerable |
InternetNews September 1, 2004 Ryan Naraine |
Oracle Patch Day: Critical Flaws Fixed Security patches released for multiple 'high risk' flaws in Oracle's enterprise-focused products. |
PC World September 4, 2001 Kim Zetter |
Did FBI Ignore Code Red Warning? Fast-spreading malicious worm may have had a less successful predecessor... |
InternetNews April 28, 2004 Ryan Naraine |
Blaster Redux? SSL Worm Threat Rising Security experts have spotted the first signs of a Blaster-like worm circulating underground, prompting fears that major Internet disruptions could be less than a week away. |
InternetNews February 12, 2004 Ryan Naraine |
MyDoom Ends but Open Ports Attracting Mutants Microsoft releases a virus removal tool, but unpatched drone machines are still a major threat. |
InternetNews February 5, 2010 |
SQL Injections Led to 60% of UK Data Breaches Malicious hackers are relying on growing numbers of increasingly complex SQL attacks to get at companies' data. |
InternetNews December 23, 2008 Sean Michael Kerner |
New Zero-Day Exploit Emerges for Microsoft SQL Microsoft issues warning for attack vector that could paralyze database servers. |
Bio-IT World May 9, 2003 Mark D. Uehling |
Data Rapture? Electronic capture of data: Some say it unclogs the medieval clinical trials process. Others remain skeptical of software and put their trust in paper. |
InternetNews April 12, 2005 Michael Singer |
Oracle Security Updates Include PeopleSoft Fixes The company issued 15 separate patches for multiple security vulnerabilities, but older flaws still loom. |
InternetNews August 18, 2005 Tim Gray |
Warily Watching Worm Variants Versions of the Zotob worm continue to slam corporate networks while security vendors and Microsoft play defense. |
InternetNews August 10, 2006 Andy Patrizio |
To Patch Or Not To Patch? Microsoft issues a fix to a severe hole. The government insists we use it, but is there a risk? |
InternetNews October 11, 2004 Ryan Naraine |
Web Servers, BIND Top 2004 Vulnerabilities List The SANS institute breaks down the top 10 vulnerabilities in Windows and Unix systems. |
Bio-IT World July 2005 David Fishbach |
Does EDC Herald the End of CTMS? Clinical trial managements systems (CTMSs) and Electronic data capture systems (EDCs) are compared with respect to their history, advantages and disadvantages. Studies suggest both have enough advantages to survive in some form of integrated solution. |
Entrepreneur November 2003 Jane Easter Bahls |
This Means War Put up your best fight to protect your network, or you could be held liable for damages to customers. |
PC World January 28, 2003 Grant Gross |
FAA: Slammer Didn't Hurt, But the Next One Might Agency says its air traffic control network wasn't compromised by worm's attack on the Internet, but admits it could happen in the future. |
Bio-IT World April 2007 Deborah Borfitz |
Fusion Makes the Difference at Oracle With Fusion, Oracle will begin combining the best features of its JD Edwards, Siebel, and E-Business Suite product lines to form a new collection of web-based applications based on service-oriented architecture. Many life science companies globally run Oracle applications. |
Bio-IT World April 15, 2003 Paul Bleicher |
E-Sourcing: Covering the Regulatory Bases Capturing clinical source data electronically can hit a home run for trial efficiency and safety -- but access control is key. Here's an expert guide. |
Pharmaceutical Executive November 1, 2006 |
Unraveling the eSource Industry-wide standards for electronic patient data have long felt like buried treasure. Companies today are getting closer - by way of a tangled map. |
InternetNews April 10, 2007 Andy Patrizio |
Three Critical Fixes For Windows Microsoft releases three significant fixes for Windows, but Office remains exposed. |
InternetNews November 18, 2004 Michael Singer |
Major Security Patch Overhaul For Oracle Changes come after the growing number of complaints from customers and even its own executives. |
Pharmaceutical Executive July 1, 2006 Jeannette Park |
Roundtable: Are We There Yet? How About Now? Now? Can Electronic Data Capture become the industry standard for clinical trials? In this roundtable discussion, six early adopters reveal where they struggled, and what you need to know to implement this new technology. |
HBS Working Knowledge June 30, 2003 Austin & Darby |
Computer Security is For Managers, Too Computer security isn't just an IT headache, say two Harvard professors. Here are eight to-do items for managers to protect their digital assets. |
InternetNews May 9, 2006 Ed Sutherland |
Microsoft Patches Critical Exchange, Flash Holes Microsoft released three patches - two deemed critical - covering vulnerabilities in Microsoft Exchange, Flash and Windows. |
PC World September 19, 2001 Frank Thorsberg |
Nimda Worm Continues Attack Security firms identify some damage in the wake of worm traveling the world by e-mail... |
InternetNews April 13, 2004 Sharon Gaudin |
Browser-based Attacks 'Surging' Virulent viruses and worms aren't the only things to watch out for. Security analysts say browser-based attacks are escalating in frequency and damage. And now a new study backs up the warnings. |
InternetNews May 26, 2004 Ryan Naraine |
Korgo Worm Targets LSASS Flaw The detection of a new network worm is a clear indication that users have still not applied Microsoft's MS04-011 update. |
PC World August 17, 2001 Andrew Brandt |
Code Red Worm Crawls Again Here's how to protect your systems from the potential menace's monthly emergence... |
Bio-IT World April 16, 2004 Joel Hoffman |
Taking the Trial Out of Clinical Outsourcing Make sure the vendor's standard operating procedures will mesh with your own, and then tirelessly work toward systems integration. |
InternetNews October 20, 2005 Jim Wagner |
Slew of Patches From Oracle Oracle issued its latest batch of security patches affecting its software products Wednesday. |
InternetNews December 23, 2003 Sharon Gaudin |
2003 'Worst Year Ever' for Viruses, Worms In no other year have computer viruses and worms wreaked so much havoc and caused so much damage as in this past year, according to security analysts. |
T.H.E. Journal September 2003 Roger Del Russo |
Securing Your Computer Network Your entire district could be brought to its knees by a hacker's assault, and the costs of reviving the network could be astronomical. While district administrators may have devised plans for securing the physical plant of the school, they rarely consider the vulnerability of their computer networks. |