Companies that better target their security spending actually spend less and have more effective security programs
Regulations are leading organizations toward automated database intrusion prevention, auditing, and encryption
Free Stuff a Security Risk; New Firefox Flaws Surface
Criminal intentions behind half of all attacks; mass-mailing worms on the outs
Forrester pushes personal firewalls, virus writers join forces, Windows rootkits circulate, Symantec sees kid sites awash in adware
Identity theft draws media attention; phishing attacks skyrocket
Automating E-Mail Retention, Industry Forms VoIP Security Alliance
Resistance, then acceptance of automated e-mail retention; reports of spam’s decline premature
Don't forget to secure your VoIP network
A new report examines IPS products in rigid performance, security, and usability tests.
The Department of Defense adopts new certification verification processes
Keeping hard drive data encrypted is more important than ever
Software can establish a baseline of "normal" application activity, then sound the alarm when an app behaves erratically
Two trends are driving the growth of digital signatures for sign-off and revisions of digital documents
HIPAA mandates penalties for data disclosure. Here's how a hospital went about finding an intrusion detection solution.
When it comes to information security, does the U.S. Department of Homeland Security have a blind spot?
What's in store for information security
Charting spyware growth, identity theft at universities, safer Web browsing
Microsoft, Solaris vulnerabilities; top spyware threats; IPS use rising
Spyware is a moving target. Pushing out one level of filters just doesn’t cut it any more.