New regulations mandate increased security for utilities' supervisory control and data acquisition systems
ISO 17799, the world’s most-used information security framework, gets updated.
To counter security threats, developers can reverse-engineer their products, or take a less expensive and more effective approach
Organizations can derive the benefits of endpoint-security standards without the standards
Automated backups for compliance are essential in regulated industries, yet sometimes users need to make their own sets of compliance-related e-mails. Enter drag-and-drop archiving.
It's difficult to audit administrative passwords if you're not managing them properly. That's what drove Manitoba Lotteries Corp. to employ a password vault.
A financial firm faces regulations for monitoring and retaining IM communications.
Beware Standalone Patch Products, Banks Adopt More Security, Improving Can-Spam
Architecting fine-grained access to Web Services for many users at multiple organizations is difficult to implement or audit using identity management software. We discuss alternatives.
How organizations can get (and stay) compliant while spending less
The need to protect its IM users from outside attacks, spam, and regulatory requirements leads Kansas’ largest electric utility to adopt IM monitoring software.
CA Antivirus Vulnerabilities; AOL Patches New Netscape; Beware Phishing E-mails Bearing Keylogging Software; New Trojan Encrypts PCs
Despite dedicated software to defend the enterprise, the economics of spyware leads attackers to respond with more complex attacks or attacks aimed at just one company.
Prosecuting Spyware Makers, A New Endpoint Security Standard
WS-Security, Liberty, and SAML play nice together
A cybersecurity group works to improve security in the chemical industry.
Security managers have boosted antivirus and firewall protection, but enterprises may need to switch gears as new regulations target how enterprises handle personally identifying data
Symantec Antivirus Vulnerability; New Identity Management Acquisitions; NIST Releases HIPAA Security Guide
Cape Cod Cooperative Bank chooses a dedicated appliance to can its network for vulnerabilities
Mobile phones, lack of policies expose the enterprise