Security Management


Does Open-Source Software Mean Better Security?

Setting the open-source security record straight

Best Practices: Patch Management

To more rapidly test patches and keep network configurations from drifting, keep a closer watch on every device’s configuration

In Brief

Blame unusable security, not users; Apple worm; high-speed IPS

Bias-Free Security Testing

New security-risk management tools bridge the security/business gap

Missing from SOX Compliance Efforts: IM Audits, Archives

With the November 15 deadline looming for many organizations, many companies still don’t have a plan for auditing and archiving instant messages.

Google Desktop Search Tool Raises Security Concerns

Free hard-drive indexing utility raises corporate security and privacy questions

Ten Best Practices to Secure Web Services

As more organizations embrace Web services (which opens back-office processes to partners and the Internet), a problem is emerging: who inside the organization is in charge of Web services security?

Thwarting Next-Generation Denial-of-Service Attacks

Domain name registrar copes with DoS spike

Q&A: Using Business Rules to Tackle Vulnerabilities

Identifying business assets to aid threat mitigation

Case Study: Credit Union Encrypts Data onto Secure USB Keys

How one financial company distributes secure information to its board of directors, many of whom work in an insecure environment

In Brief

Human error and security; AOL's two-factor authentication; September viruses

Understanding the New Breed of Hackers

Knowing how today's hackers think and work is the first step to combating their attacks.

Best Practices: Security Budgeting for 2005

IT must cope with under-funded regulations, more CIO leeway

In Brief

RealPlayer and JPEG vulnerabilities; security insurance

Patch or Perish: Symantec Notes Dramatic Increase in Threats

Symantec's assessment of system vulnerabilities in the first half of this year shows a dramatic increase in the number and potential destruction of security threats.

In Brief

Banks help ID thieves; unified security appliances; server security

In Brief

Symantec grabs @Stake; JPEG vulnerabilities; Mozilla holes; Sniffer worm

Case Study: Outsourcing Network Management and Security

How one company found an outsourcer able to manage its network equipment and offer cogent security advice

Case Study: Law Firm Isolates Potential Threats

Office uses one-stop monitoring for attacks and vulnerabilities

Inside Attackers Often Unremarkable, Warns CERT

Most attacks are relatively unsophisticated, planned in advance, conducted during normal business hours, and start from inside the organization. The common driver comes as no surprise: money.