VeriTest, an independent testing lab, pitted three popular anti-spyware products against each other for four months, but such performance results can be problematic.
Don’t let the lack of a name change fool you. Under Vista, Active Directory and Group Policy settings get a substantial makeover, and that has security-policy management, endpoint security, and backwards compatibility implications. Here’s what to expect.
Are companies’ current wireless router security practices sufficient? Security policies are too often manually applied, and it shows.
Are your backup tapes a security risk? After numerous high-profile tape losses, and the resulting notifications to millions of Americans, many companies still don’t encrypt their backup tapes.
Speaking a language spyware purveyors understand: fines and jail time
While many IT managers obsess about hackers and external attackers purloining sensitive company information, studies point to a worse problem: the insider threat.
The next-generation Microsoft operating system packs needed security features, but the adoption forecast for Windows-weary enterprises is cloudy.
While teaching developers “secure coding” techniques is important, experts say far more is needed to actually produce secure applications.
Regulated companies are increasingly adopting NAC to screen network access, enforce security policies, and block malware outbreaks.
Microsoft released six critical updates for PC and Mac, and Adobe patched Flash. Grabbing headlines, however, was the file-eradication spree triggered by an update to McAfee's antivirus program, causing users to question automatic patches.
While many small and medium-size companies fear spyware, they don’t think spyware infections can happen to them. Despite highlighting viruses, worms, and spyware as top network security concerns, many don’t actively combat even one of these problems.
Bot networks are behind the rise in malicious code aimed at capturing sensitive information. Also, IM attacks decrease during February.
The need to automate time-consuming, manual patch processes drove one financial institution to adopt patch management software.
Thanks to improved corporate information security practices, attackers are seeking new methods for accessing sensitive corporate information, putting storage media more at risk than ever. We offer several recommendations for destroying data.
After the largest known compromise of personal information, the FTC details the information security failures that helped caused it.
The growth in Web Services and service-oriented architectures enables businesses to more quickly and automatically trade information and computing resources. Now it’s up to federated identity management to secure it.
Increasing numbers of mobile users and poor laptop security management creates a growing risk; a new specification pushes trusted-storage applications
No, Systems Network Architecture (SNA) isn’t making a comeback. Instead, Nortel’s Secure Network Access (also SNA) deliverable is the latest take on a hot new network security paradigm
Microsoft patches two highly critical vulnerabilities and corrects a dud patch-installation process, while IBM issues patches for six Lotus Notes problems
How quickly can you search and retrieve e-mail and instant messages relevant to a regulatory inquiry or court-ordered discovery process?