In an age of Sarbanes-Oxley and similar regulatory measures, how could a single rogue trader have racked up more than $7 billion in losses?
Why organizations need to get serious about security awareness training
With mobile security, the devil you don’t know can hurt you much more than the devil you think you know
Multiple, overlapping, and mutually supportive defensive systems and patched, up-to-date systems can help consumers and businesses take advantage of the Internet while avoiding its dangers.
Will it be "same old, same old" in security for 2008?
A new report from the IT Policy Compliance Group examined leaders and laggards to identify core competencies and steps to improve data protection.
Industry standards and trusted hardware keep out unauthorized users and equipment
Rowing though the backwaters may keep you more secure
Security isn’t a current stumbling block for Oracle 11g and Applications Security Inc. represents a breed plugging database security gaps
Before unleashing sites and software, these products will spotlight code that can leave you vulnerable
Despite the security weaknesses of FTP, there are several approaches IT can take to use the protocol safely.
Security professionals claim it’s possible to bypass service-side security settings using RDP 6.0 clients.
IT may need to install a memory-leak fix for Windows Installer before other security-related updates can be installed.
If you have an AS/400 or iSeries, PowerTech Group wants you to update your security model—and a recent study suggests you should pay close attention
Antivirus/antispyware package get upgrades while small and mid-size businesses get backup and migration tools
While a NAC solution blocks infected endpoints from entering the network, what happens when a connected PC becomes non-compliant?
Symantec Corp.’s Advanced Threat Research team reports that Windows Vista does deliver tangible security improvements—but Vista is still far from invulnerable.
IT is still largely unprotected from one area of enterprise risk: the insider threat.
Microsoft doesn’t put enough edge into its security products, yet.
In the second of our two-part series, Michigan’s CISO discusses planning for pandemics and other natural (and even man-made) disasters.