When it comes to malware, one company says their product separates the wheat from the chaff, advising enterprises which files should and shouldn’t be on their systems.
Labor Day marks the move-in for most students, and it also marks the beginning of labor-intensive work for IT departments across colleges and universities nationwide. Find out what one institution is doing to secure its network for the school year.
Despite increased security spending, the number of security breaches also increases. Plus, how Trojan applications have displaced worms and viruses as top threats—and why.
New anti-spyware functionality highlights the enterprise security question: should you go for best of breed or opt for a security suite?
Dealing with an e-mail worm targeting a Web application, and a vulnerability in IBM DB2. Plus, how to create a performance metrics program.
How to evaluate the security of applications you build or buy, and justify those requirements to senior management.
Microsoft moves to patch a “zero-day” Word vulnerability. Meanwhile in a first, a new worm arrives bearing its own browser—the better to launch drive-by download attacks.
A projected decrease in next year’s IT budget growth has unclear implications for security spending. Meanwhile, rootkits grow more virulent.
What’s the best way to stop users from inadvertently compromising your company’s information security?
With IM use increasing 200 percent per year, unmanaged enterprise IM is a growing security risk. Plus, Check Point pushes one-console management for perimeter, internal, Web, and endpoint security.
Patching remains a manual, time-intensive process, despite more automated tools.
VeriTest, an independent testing lab, pitted three popular anti-spyware products against each other for four months, but such performance results can be problematic.
Speaking a language spyware purveyors understand: fines and jail time
While many IT managers obsess about hackers and external attackers purloining sensitive company information, studies point to a worse problem: the insider threat.
While teaching developers “secure coding” techniques is important, experts say far more is needed to actually produce secure applications.
Microsoft released six critical updates for PC and Mac, and Adobe patched Flash. Grabbing headlines, however, was the file-eradication spree triggered by an update to McAfee's antivirus program, causing users to question automatic patches.
While many small and medium-size companies fear spyware, they don’t think spyware infections can happen to them. Despite highlighting viruses, worms, and spyware as top network security concerns, many don’t actively combat even one of these problems.
Bot networks are behind the rise in malicious code aimed at capturing sensitive information. Also, IM attacks decrease during February.
The need to automate time-consuming, manual patch processes drove one financial institution to adopt patch management software.
Microsoft patches two highly critical vulnerabilities and corrects a dud patch-installation process, while IBM issues patches for six Lotus Notes problems