New regulations mandate increased security for utilities' supervisory control and data acquisition systems
ISO 17799, the world’s most-used information security framework, gets updated.
What exactly is spyware? Just as with viruses, discussion of malware, grayware, adware, and spyware often gets hung up on definitions, and lately even legal threats over classifications.
Infrequent updates in security products themselves can be dangerous
The term “endpoint security” includes new types of technology, which makes sense when Polysius’ manager of IT details the myriad, evolving threats to his corporate network, and the company's defenses.
Exploits are already circulating for a recently announced Windows plug-and-play vulnerability. Experts recommend better endpoint security controls.
To counter security threats, developers can reverse-engineer their products, or take a less expensive and more effective approach
Microsoft details five critical vulnerabilities, including flaw that could be automatically exploited by a malicious Web page or e-mail
Organizations can derive the benefits of endpoint-security standards without the standards
Automated backups for compliance are essential in regulated industries, yet sometimes users need to make their own sets of compliance-related e-mails. Enter drag-and-drop archiving.
Know of a harmful vulnerability that hasn’t gone public? A new program wants to hear about it.
It's difficult to audit administrative passwords if you're not managing them properly. That's what drove Manitoba Lotteries Corp. to employ a password vault.
The latest Computer Crime and Security Survey shows cybercrime incidents and the cost of security breaches are decreasing, but Web site attacks and thefts of sensitive information are rising quickly.
An end user with two real-time anti-spyware engines asks if too much anti-spyware software is a bad thing
It's tough to determine an ROI for security investments. Looking at cost avoidance may be the way to go.
Microsoft patches two buffer overflow vulnerabilities, Apple patches OS X 10.4
How can organizations better contain virus outbreaks and defend against destructive or mass-mailing worms?
Automated worms and malware-born invaders are still wreaking havoc in the enterprise, and financial losses from cyber-criminals are increasing.
Too often, Microsoft’s Active Directory and its Group Policy Objects don't offer the granularity security administrators need.
More organizations are using fingerprints for logging onto PCs and into sensitive applications.