Security Management


Microsoft Update Onslaught Targets Spyware, Viruses

Experts say Microsoft could be leading the charge for antivirus and anti-spyware software that runs from a single interface

Locking Down Laptops

Keeping hard drive data encrypted is more important than ever

Case Study: Virtual Patches Defend Web Applications

Web-application firewalls protect against unknown attacks

Control Systems Leave Manufacturers Vulnerable

Manufacturers' inability to patch their computers against every newly discovered virus and worm leaves their systems highly exposed

In Brief

Security hiring growth slow but steady; end-users blame ISPs and product vendors for spam

Defection to More-Secure Browsers? Don't Bet On It

With more-secure browser alternatives now available, will IE go by the boards?

In Brief

2005 security growth areas, tricking code to reveal its flaws, and a mobile-phone virus gets legs

Case Study: Adopting Inverted Firewalls

How to safeguard an educational network when its users face few rules and resources don’t exist to police them closely

In Brief

Automated bots crawl Internet for spyware, and the NSA talks about securing Mac OS X installations

Security Spending Trends for 2005

What's hot in security spending this year

Q&A: Open Source Network Vulnerability Scanners

Vulnerability management is no longer about maintaining perfectly patched machines.

Case Study: Protecting Hospitals’ Increasingly Networked Systems

HIPAA mandates penalties for data disclosure. Here's how a hospital went about finding an intrusion detection solution.

Untangling Endpoint Security Initiatives

Two Endpoint security initiatives are underway—one from Cisco, the other from Microsoft. We take a closer look at these plus the evolution of endpoint security.

HP Throttles Viruses, Cracks OpenView Identity

The latest security announcements from Hewlett-Packard

Top Ten Security Trends for 2005

What's in store for information security

New Enterprise Tools Attack Spyware

Spyware is a moving target. Pushing out one level of filters just doesn’t cut it any more.

In Brief

Microsoft, Solaris vulnerabilities; top spyware threats; IPS use rising

Case Study: Securing Network Bandwidth

A packet-shaping tool can help handle worm outbreaks.

Case Study: Finding and Fixing Security-Related Code Defects

Finding code problems was the challenge; a service provider's analysis held the answer

Microsoft and IBM Hone Security Warning Systems

Better security updates in the offing