Companies that better target their security spending actually spend less and have more effective security programs
Symantec Antivirus Vulnerability; New Identity Management Acquisitions; NIST Releases HIPAA Security Guide
How can IT managers secure endpoints over which they have no control?
Chances are your VPN is vulnerable
The Department of Defense adopts new certification verification processes
Two trends are driving the growth of digital signatures for sign-off and revisions of digital documents
Two Endpoint security initiatives are underway—one from Cisco, the other from Microsoft. We take a closer look at these plus the evolution of endpoint security.
What's in store for information security
Microsoft, Solaris vulnerabilities; top spyware threats; IPS use rising
A packet-shaping tool can help handle worm outbreaks.
Database and Imsecure vulnerabilities, search software flaw enables sophisticated phishing attack
Denial is not a legitimate wireless strategy
Human error and security; AOL's two-factor authentication; September viruses
Increasingly, PCs must prove they're secure before a user can log onto the network
Smart cards, currently a favorite of governments and large corporations, are getting more powerful, incorporating Java and USB technologies.
Once they seemed doomed, but public key infrastructure is taking off, driven by e-commerce servers, Pentagon requirements, and government regulations.
Your security policy has to have teeth. Here's how to enforce your endpoint security policy.
Managed security service providers to dominate security market by 2010
A new Microsoft initiative eases management headaches by building management features into products that can be accessed by a variety of enterprise management tools. SCO's Vintela Authorization may give us a glimpse into how Microsoft networks can finally play nice with other operating systems.
Host-based intrusion prevention runs as a software agent on a user's system, looking for unauthorized actions