Recent articles by Jim Carr

Secunia: Nearly a third of applications missing critical patches

Secunia: Nearly a third of applications missing critical patches

Nearly a third of all applications on corporate networks are missing critical security patches and are at risk to security breaches, according to a new report from Secunia.
Jim Carr May 21 2007 4:11AM Security
Secunia: Corporate applications missing critical patches

Secunia: Corporate applications missing critical patches

Nearly a third of all applications on corporate networks are missing critical security patches and are at risk to security breaches, according to a new report from Secunia.
Jim Carr May 18 2007 9:53AM Security
Google: 450,000 websites launching drive-by attacks

Google: 450,000 websites launching drive-by attacks

A Google white paper analysing web-based malware has reported that nearly a half-million URLs contain malicious code.
Jim Carr May 17 2007 10:10AM Security
Some Windows users get system freeze with May patches

Some Windows users get system freeze with May patches

An unidentified number of Windows users got more than they bargained for with Microsoft's latest round of Patch Tuesday security fixes when their PCs froze for hours while installing the updates.
Jim Carr May 15 2007 9:22AM Security
Computer Economics study: Insiders top IT pros' worries

Computer Economics study: Insiders top IT pros' worries

Researchers have pointed their fingers at insiders as the main security bugaboos facing enterprises.
Jim Carr May 11 2007 9:51AM Security
Traffic control

Traffic control

How do you spell trust? Not I-P-S — at least, not if you're an enterprise security manager deploying an intrusion prevention system (IPS) for the first time. Once heralded as the "smarter" cousin of the intrusion detection system (IDS) — destined to eventually kick its kin out of the data center because of its "intelligent" ability to block, not just identify, security threats — the IPS instead has reached a sort of détente with the IDS. Rather than supplanting the IDS with an IPS, many enterprises use the two devices in complementary fashion.
Jim Carr Jul 10 2006 8:30PM Security
The switch is on

The switch is on

Tarron Weir and Joseph Raquel might well be "poster boys" for the Secure Sockets Layer (SSL) virtual private network (VPN) movement. In fact, their experience with the latest in secure remote-access technology more or less epitomizes what’s going on in the VPN marketplace right now.
Jim Carr Jun 6 2006 8:05PM Security
Controlling the endpoint

Controlling the endpoint

There’s yet another IT security bandwagon onto which any number of vendors are jumping. And, whether companies refer to it as network access management (NAM), network access control (NAC), or network access protection (NAP), the main question is: Who has the real deal?
Jim Carr Apr 14 2006 8:14PM Security
Thwarting ID thieves

Thwarting ID thieves

David Lazarus is not your typical victim of identity theft. Most notably, he fought back and won — a rarity even in today’s era of heightened government oversight of corporate shenanigans.
Jim Carr Mar 6 2006 8:27PM Security
Cyberattackers take aim

Cyberattackers take aim

Predictions, like fog, are hard to get your arms around, but here is one that will prove more than just a mere exercise in prophesizing: The next wave of security threats will be targeted attacks aimed at specific organizations or individuals within enterprises.
Jim Carr Feb 8 2006 9:00PM Security
IT asset dollars and sense

IT asset dollars and sense

When truth is stranger than fiction — as it often is in enterprise IT departments — managing technology assets securely can require a powerful imagination. Indeed, how IT departments cope with issues such as the obsoleting of hard drives and eliminating so-called “double-campers ” from their resources might well determine whether or not they can claim their IT assets are truly secure.
Jim Carr Jan 13 2006 9:59PM Security
Relying on the logs to recover

Relying on the logs to recover

When bad things happen to good networks — and no enterprise is completely immune from attacks on its IT infrastructure anymore — how the good guys fight back can make or break the company’s ability to survive the threat.
Jim Carr Dec 15 2005 10:16PM Security
How to be a survivor

How to be a survivor

Using the information supplied through your IDS and IPS in the right way could dramatically improve your incident response plans, discovers Jim Carr
Jim Carr Dec 9 2005 3:24PM Security
How business learned to love open source

How business learned to love open source

More and more proprietary security tools use some open-source code. What are the advantages for companies?
Jim Carr Nov 9 2005 4:23PM Security
Get it together

Get it together

Your systems kick out a vast number of logs, but it’s getting harder to make sense of them. Jim Carr looks at the new face of aggregation: SIM
Jim Carr Oct 21 2005 2:50PM Security
Get it together

Get it together

Whether you have a SOX problem or a HIPAA ailment, it is becoming more tempting to enlist a SIM. But beware what you’re buying into. Vendors are heavily hyping their security incident management (SIM) wares as the cure-all for meeting regulatory compliance standards such as the Sarbanes-Oxley (SOX) and Health Insurance Portability and Accountability Acts (HIPAA). If anything, they’re half right.
Jim Carr Oct 10 2005 6:32PM Security
Strange brew

Strange brew

Blended threats are the next big thing for those who want to attack your firm. It’s time to get on the case, says Jim Carr
Jim Carr Aug 26 2005 11:32AM Security
You can’t stop IM so learn to love it

You can’t stop IM so learn to love it

Instant messaging is the future, says Jim Carr, and there is a world of possibility waiting out there. But there is risk as well as benefit, and it must be faced
Jim Carr May 12 2005 4:36PM Security

Log In

  |  Forgot your password?