Microsoft doesn’t put enough edge into its security products, yet.
In the second of our two-part series, Michigan’s CISO discusses planning for pandemics and other natural (and even man-made) disasters.
Hackers can take control of a Vista machine
What's on SPI Labs' list of top Web application security threats it expects this year?
A new exploit potentially lets an attacker execute code on a user’s machine
PGP Corporation may have the handle on protecting sensitive data everywhere
Spam and phishing attacks are getting worse, and new Web threats will complicate networks until some reputations are established
A majority of survey respondents looking to implement an NAC solution want to reduce malware incidents, control remote access to the network, and enforce endpoint configurations.
From smarter criminals to network access protection, IT is going to have its hands full in 2007.
For sensitive data sitting on a portable, encryption is no longer an option. It’s a necessity.
Increasingly, hackers have infiltrated "protected" enterprise networks. One NAC provider says the key to maximizing your protection is to know what’s on your network.
IT needs to adopt a multi-step approach—moving from denial to active management—and address enterprise IM use.
A new product provides enterprises with a risk assessment analysis that keeps everyone informed.
New study shows disconnect between executives' understanding and action
New IBM initiatives target hackers and insider threats in a single, complete security platform.
If you’re only as secure as your weakest link, printers could be your biggest threat.
Guarding against external threats is important, but don’t overlook legacy systems security.
To reverse the rise of Web-application vulnerabilities, enterprises must patch more than just their operating systems.
Three key features IT should look for when shopping for a UTM solution.
A new encryption solution promises to keep employees honest and reduce the number of enterprise "insiders."