Eight Firefox Vulnerabilities; Microsoft Previews Longhorn Security; Windows XP SP2 Rollout Lags
Companies that better target their security spending actually spend less and have more effective security programs
Regulations are leading organizations toward automated database intrusion prevention, auditing, and encryption
Free Stuff a Security Risk; New Firefox Flaws Surface
Criminal intentions behind half of all attacks; mass-mailing worms on the outs
Forrester pushes personal firewalls, virus writers join forces, Windows rootkits circulate, Symantec sees kid sites awash in adware
Automating E-Mail Retention, Industry Forms VoIP Security Alliance
Identity theft draws media attention; phishing attacks skyrocket
Don't forget to secure your VoIP network
Resistance, then acceptance of automated e-mail retention; reports of spam’s decline premature
A new report examines IPS products in rigid performance, security, and usability tests.
Keeping hard drive data encrypted is more important than ever
The Department of Defense adopts new certification verification processes
Software can establish a baseline of "normal" application activity, then sound the alarm when an app behaves erratically
Two trends are driving the growth of digital signatures for sign-off and revisions of digital documents
HIPAA mandates penalties for data disclosure. Here's how a hospital went about finding an intrusion detection solution.
When it comes to information security, does the U.S. Department of Homeland Security have a blind spot?
Charting spyware growth, identity theft at universities, safer Web browsing
What's in store for information security
Spyware is a moving target. Pushing out one level of filters just doesn’t cut it any more.