Security Management


Inside Attackers Often Unremarkable, Warns CERT

Most attacks are relatively unsophisticated, planned in advance, conducted during normal business hours, and start from inside the organization. The common driver comes as no surprise: money.

Yankee Group Says Security Outsourcing Set to Explode

Managed security service providers to dominate security market by 2010

Five Steps to Enforcing Your Endpoint Security

Your security policy has to have teeth. Here's how to enforce your endpoint security policy.

Passing the WLAN Security Buck

Company offers outsourced wireless LAN to overcome security vulnerabilities

Briefs

More XP SP2 woes, fraud awareness survey, Can-Spam's failure

CA Jumps into Anti-Spyware Market

Acquisition of PestPatrol signals single-console management of viruses, spam, and spyware may not be far away.

New Technology Combats Zero-Day Attacks

Exploits expected to get worse, putting even more pressure on security managers

Web Caller-ID Arrests Spoof Sites

New technology in a user-friendly toolbar intercepts users from visiting such sites

Top 10 Security Modifications in Windows XP Service Pack 2

This XP Service Pack should be called a Security Pack

Top Five Security Control Points Auditors Miss

Make sure you check these essential control points in any Windows network audit

Security Briefs

Active X Allows File Loading; Defining Spyware

Rethinking Security/Network Boundaries

IT is reassessing how network administrators and security personnel can work together more effectively

Quantifying the Threat from Insiders

Your greatest security risk may not come from outside attacks but from your own employees. Setting policies and procedures aren't enough to stop the problem, but new security event management technology can help.

Four Criteria for Choosing a Distributed Security Solution

Only distributed security can protect the borderless enterprise from today's threats.

American E-business Struggles with Global Fraud

Forty percent of U.S. credit card fraud traced to handful of criminals from just five foreign countries; risk of punishment not a deterrent

Five Signs Your Enterprise Needs Distributed Security

After years of merely reacting to new vulnerabilities, a centralized security model can no longer counter today's threats.

Human Error Tops List of Vulnerabilities

Only half of respondents in a new survey say their company has a written security policy. Furthermore, despite the increases in threats, many organizations have been slow to make the appropriate investments in time and budget to properly address them.

Q&A: Single-System Message Management

It's not just a matter of blocking unsolicited e-mail. Today's security professionals need to protect against outbound as well as inbound problems.

Security Managers Report Virus Problem Worse

New report charts security manager dissatisfaction