Communication and monitoring are key, but policies must evolve with changing regulations and new technologies
Automating E-Mail Retention, Industry Forms VoIP Security Alliance
Survey shows security managers still face budget battle
CSOs concerned by malware and regulations; top IM security predictions; Eudora vulnerability
HIPAA mandates penalties for data disclosure. Here's how a hospital went about finding an intrusion detection solution.
When it comes to information security, does the U.S. Department of Homeland Security have a blind spot?
What's in store for information security
Charting spyware growth, identity theft at universities, safer Web browsing
Microsoft, Solaris vulnerabilities; top spyware threats; IPS use rising
With the November 15 deadline looming for many organizations, many companies still don’t have a plan for auditing and archiving instant messages.
Software vaults are increasingly the solution for securing passwords, notes from the board of directors, and more
IT must cope with under-funded regulations, more CIO leeway
Under pressure from such regulations as HIPAA, the Gramm-Leach-Bliley Act, and Sarbanes-Oxley, companies increasingly have to account for their corporate instant messaging policies. Yet many organizations don’t have rules for IM use.
Most unsolicited e-mail originates in U.S., survey finds; securing storage; name-dropping attacks
Once they seemed doomed, but public key infrastructure is taking off, driven by e-commerce servers, Pentagon requirements, and government regulations.
Your security policy has to have teeth. Here's how to enforce your endpoint security policy.
More XP SP2 woes, fraud awareness survey, Can-Spam's failure
Public key infrastructure isn't dead yet.
Security becomes a boardroom issue
Finding just the right provider can be tricky. How one company made its decision.