Security


Anti-Spyware Shootout

VeriTest, an independent testing lab, pitted three popular anti-spyware products against each other for four months, but such performance results can be problematic.

Active Directory in Vista: Same Name, Substantial Changes

Don’t let the lack of a name change fool you. Under Vista, Active Directory and Group Policy settings get a substantial makeover, and that has security-policy management, endpoint security, and backwards compatibility implications. Here’s what to expect.

Security Lax with Wireless Routers

Are companies’ current wireless router security practices sufficient? Security policies are too often manually applied, and it shows.

Backup-Tape Security: Enter the “Brown Bag”

Are your backup tapes a security risk? After numerous high-profile tape losses, and the resulting notifications to millions of Americans, many companies still don’t encrypt their backup tapes.

New York Sues Over Alleged Spyware

Speaking a language spyware purveyors understand: fines and jail time

The Attack from Within: Stopping Malicious Insiders

While many IT managers obsess about hackers and external attackers purloining sensitive company information, studies point to a worse problem: the insider threat.

More Vista Security Details Emerge, But Will Enterprises Bite?

The next-generation Microsoft operating system packs needed security features, but the adoption forecast for Windows-weary enterprises is cloudy.



Building Better Applications: Beyond Secure Coding

While teaching developers “secure coding” techniques is important, experts say far more is needed to actually produce secure applications.

Regulations Spur Adoption of Network Access Control

Regulated companies are increasingly adopting NAC to screen network access, enforce security policies, and block malware outbreaks.

Fixes from Microsoft and Adobe, Havoc from McAfee

Microsoft released six critical updates for PC and Mac, and Adobe patched Flash. Grabbing headlines, however, was the file-eradication spree triggered by an update to McAfee's antivirus program, causing users to question automatic patches.

Q&A: IT in Denial over Spyware

While many small and medium-size companies fear spyware, they don’t think spyware infections can happen to them. Despite highlighting viruses, worms, and spyware as top network security concerns, many don’t actively combat even one of these problems.

Bot Networks Hurl More Trojan Code

Bot networks are behind the rise in malicious code aimed at capturing sensitive information. Also, IM attacks decrease during February.

Case Study: Patching the SAFE Federal Credit Union

The need to automate time-consuming, manual patch processes drove one financial institution to adopt patch management software.

Destroy, Shred, Disintegrate: Guidelines for Securely Decommissioning Storage

Thanks to improved corporate information security practices, attackers are seeking new methods for accessing sensitive corporate information, putting storage media more at risk than ever. We offer several recommendations for destroying data.

Forty Million Stolen Identities Later: Learning from CardSystems' Breach

After the largest known compromise of personal information, the FTC details the information security failures that helped caused it.

The Push for Federated Identity Management

The growth in Web Services and service-oriented architectures enables businesses to more quickly and automatically trade information and computing resources. Now it’s up to federated identity management to secure it.

Do You Trust Your Storage to Mitigate Mobile-Device Threats?

Increasing numbers of mobile users and poor laptop security management creates a growing risk; a new specification pushes trusted-storage applications

SNA and the Hot New Network Security Paradigm

No, Systems Network Architecture (SNA) isn’t making a comeback. Instead, Nortel’s Secure Network Access (also SNA) deliverable is the latest take on a hot new network security paradigm

Microsoft, Lotus Patch “Highly Critical” Problems

Microsoft patches two highly critical vulnerabilities and corrects a dud patch-installation process, while IBM issues patches for six Lotus Notes problems

Q&A: Balancing E-Mail Security and Compliance

How quickly can you search and retrieve e-mail and instant messages relevant to a regulatory inquiry or court-ordered discovery process?