Security


New Data Security Standards Set for Utilities

New regulations mandate increased security for utilities' supervisory control and data acquisition systems

Evaluating the New ISO 17799 Standard

ISO 17799, the world’s most-used information security framework, gets updated.

Q&A: How Spyware Escapes Definition

What exactly is spyware? Just as with viruses, discussion of malware, grayware, adware, and spyware often gets hung up on definitions, and lately even legal threats over classifications.

Auto-Update for Outdated Defenses

Infrequent updates in security products themselves can be dangerous

Case Study: Polysius Takes Layered Approach to Endpoint Security

The term “endpoint security” includes new types of technology, which makes sense when Polysius’ manager of IT details the myriad, evolving threats to his corporate network, and the company's defenses.

Zotob Continues to Hammer Windows 2000

Exploits are already circulating for a recently announced Windows plug-and-play vulnerability. Experts recommend better endpoint security controls.

Regulations, Fear Driving More-Secure Code Development

To counter security threats, developers can reverse-engineer their products, or take a less expensive and more effective approach



Microsoft Can’t Count: New Vulnerability Disclosure Criticism

Microsoft details five critical vulnerabilities, including flaw that could be automatically exploited by a malicious Web page or e-mail

Q&A: The State of Endpoint Security

Organizations can derive the benefits of endpoint-security standards without the standards

Giving Users Control of E-mail Archiving for Compliance

Automated backups for compliance are essential in regulated industries, yet sometimes users need to make their own sets of compliance-related e-mails. Enter drag-and-drop archiving.

Zero Day Initiative Trades "Points" for Vulnerabilities

Know of a harmful vulnerability that hasn’t gone public? A new program wants to hear about it.

Securing Admin Passwords: It Takes a Vault

It's difficult to audit administrative passwords if you're not managing them properly. That's what drove Manitoba Lotteries Corp. to employ a password vault.

CSI Study Reveals Shifts in Security Threats

The latest Computer Crime and Security Survey shows cybercrime incidents and the cost of security breaches are decreasing, but Web site attacks and thefts of sensitive information are rising quickly.

Is Too Much Anti-Spyware a Bad Thing?

An end user with two real-time anti-spyware engines asks if too much anti-spyware software is a bad thing

The New Security ROI

It's tough to determine an ROI for security investments. Looking at cost avoidance may be the way to go.

Microsoft and Apple Patch Operating Systems

Microsoft patches two buffer overflow vulnerabilities, Apple patches OS X 10.4

Case Study: Containing Endpoint Infections

How can organizations better contain virus outbreaks and defend against destructive or mass-mailing worms?

Enterprises Battle Cyber-Criminals, Targeted Attacks

Automated worms and malware-born invaders are still wreaking havoc in the enterprise, and financial losses from cyber-criminals are increasing.

Q&A: Workarounds for Active Directory's Limitations

Too often, Microsoft’s Active Directory and its Group Policy Objects don't offer the granularity security administrators need.

Case Study: Choosing Hosted Enterprise IM

A financial firm faces regulations for monitoring and retaining IM communications.