Security: Vulnerabilities


Microsoft Forefront: Strictly Business

Microsoft doesn’t put enough edge into its security products, yet.

Planning for Pandemics and Other Disasters

In the second of our two-part series, Michigan’s CISO discusses planning for pandemics and other natural (and even man-made) disasters.

Vista Buffer-Overflow Vulnerabilities Exposed

Hackers can take control of a Vista machine

New Online Threats for the New Year

What's on SPI Labs' list of top Web application security threats it expects this year?

Yet Another Word Zero-Day Exploit Surfaces

A new exploit potentially lets an attacker execute code on a user’s machine

PGP: Encryption Everywhere

PGP Corporation may have the handle on protecting sensitive data everywhere

A Loaf, a Phish, and a Reputation

Spam and phishing attacks are getting worse, and new Web threats will complicate networks until some reputations are established

Study Reveals What’s Driving Network Access Control

A majority of survey respondents looking to implement an NAC solution want to reduce malware incidents, control remote access to the network, and enforce endpoint configurations.

Security: A Look Back and the Year Ahead

From smarter criminals to network access protection, IT is going to have its hands full in 2007.

Data Encryption: The Whole-Disk Option

For sensitive data sitting on a portable, encryption is no longer an option. It’s a necessity.

Foiling Hackers with NAC: First, Know What You Have

Increasingly, hackers have infiltrated "protected" enterprise networks. One NAC provider says the key to maximizing your protection is to know what’s on your network.

Simple Steps to IM Management

IT needs to adopt a multi-step approach—moving from denial to active management—and address enterprise IM use.

Cenzic Provides Risk Assessment of Risky Business

A new product provides enterprises with a risk assessment analysis that keeps everyone informed.

IBM Initiates Global Security Strategy

New IBM initiatives target hackers and insider threats in a single, complete security platform.

How Security Breaches Impact Your Brand

New study shows disconnect between executives' understanding and action

Could Printers Be Your Biggest Insider Threat?

If you’re only as secure as your weakest link, printers could be your biggest threat.

Audits Address Overlooked Legacy Security

Guarding against external threats is important, but don’t overlook legacy systems security.

Symantec Report Highlights Web Security Struggle

To reverse the rise of Web-application vulnerabilities, enterprises must patch more than just their operating systems.

Real World Requirements for Unified Threat Management

Three key features IT should look for when shopping for a UTM solution.

Encryption Provides Safety Net for Enterprises

A new encryption solution promises to keep employees honest and reduce the number of enterprise "insiders."