A financial firm faces regulations for monitoring and retaining IM communications.
Targeted Trojan Attacks Increase, Security Zaps Productivity, Spyware Distributor Settles
CSOs worry about infected or unknown PCs logging onto their networks, but only one-third of companies are doing something about it
Reducing computing systems’ exposure to attack may be the goal, but unhooking network connections—or “denetworking”—is rarely feasible. A network endpoint appliance may be the answer.
Identity management software adoption is increasing, but many organizations still rely upon too many group permissions to effectively manage their implementations.
Beware Standalone Patch Products, Banks Adopt More Security, Improving Can-Spam
Focus on social networking, ongoing analysis of today’s most-needed information security skills, and a diverse training regimen.
Analyzing esoteric attacks highlights where security can succeed and how secure devices can fail in unforeseen ways.
Architecting fine-grained access to Web Services for many users at multiple organizations is difficult to implement or audit using identity management software. We discuss alternatives.
Bluetooth Attack Compromises PINs, New Smart Phone Malware, Charting the E-mail Security Market
How organizations can get (and stay) compliant while spending less
Will security flaws dent Mozilla's status as a trusted alternative to Internet Explorer?
Microsoft Updates XP WiFi Security, Worm Goes Right-Wing
The need to protect its IM users from outside attacks, spam, and regulatory requirements leads Kansas’ largest electric utility to adopt IM monitoring software.
CA Antivirus Vulnerabilities; AOL Patches New Netscape; Beware Phishing E-mails Bearing Keylogging Software; New Trojan Encrypts PCs
The differences between signature-based, access control, and intrusion prevention products
While operator errors get blamed for the majority of security incidents, organizations aren’t budgeting a fix.
Avoiding Time Warner’s Backup Mistakes; Learning from Loveletter; Tivoli Offers Security Index
A new report from CERT and the U.S. Secret Service shows how to begin preventing insider attacks.
Despite dedicated software to defend the enterprise, the economics of spyware leads attackers to respond with more complex attacks or attacks aimed at just one company.