Security


Q&A: Are Fingerprints the Next Smart Card?

More organizations are using fingerprints for logging onto PCs and into sensitive applications.

Enterprises Struggle with Identity Management Roles

Identity management software adoption is increasing, but many organizations still rely upon too many group permissions to effectively manage their implementations.

In Brief

Targeted Trojan Attacks Increase, Security Zaps Productivity, Spyware Distributor Settles

CSO Worries High, Actions Lax

CSOs worry about infected or unknown PCs logging onto their networks, but only one-third of companies are doing something about it

Denetworking, Anyone?

Reducing computing systems’ exposure to attack may be the goal, but unhooking network connections—or “denetworking”—is rarely feasible. A network endpoint appliance may be the answer.

In Brief

Beware Standalone Patch Products, Banks Adopt More Security, Improving Can-Spam

Q&A: How to Get and Keep a Security Job

Focus on social networking, ongoing analysis of today’s most-needed information security skills, and a diverse training regimen.



Guarding Against Esoteric Security Leaks

Analyzing esoteric attacks highlights where security can succeed and how secure devices can fail in unforeseen ways.

In Brief

Bluetooth Attack Compromises PINs, New Smart Phone Malware, Charting the E-mail Security Market

Q&A: Moving to Web Services Identity Management

Architecting fine-grained access to Web Services for many users at multiple organizations is difficult to implement or audit using identity management software. We discuss alternatives.

How to Lower Security Compliance Costs

How organizations can get (and stay) compliant while spending less

Caveat Browser: Mozilla Targeted

Will security flaws dent Mozilla's status as a trusted alternative to Internet Explorer?

In Brief

Microsoft Updates XP WiFi Security, Worm Goes Right-Wing

Case Study: Energy Company Monitors IM

The need to protect its IM users from outside attacks, spam, and regulatory requirements leads Kansas’ largest electric utility to adopt IM monitoring software.

Q&A: Sorting Out Desktop Protection Technologies

The differences between signature-based, access control, and intrusion prevention products

In Brief

CA Antivirus Vulnerabilities; AOL Patches New Netscape; Beware Phishing E-mails Bearing Keylogging Software; New Trojan Encrypts PCs

Few Organizations Increase Spending to Improve Security

While operator errors get blamed for the majority of security incidents, organizations aren’t budgeting a fix.

In Brief

Avoiding Time Warner’s Backup Mistakes; Learning from Loveletter; Tivoli Offers Security Index

Best Practices: Defending Against Insider Attacks

A new report from CERT and the U.S. Secret Service shows how to begin preventing insider attacks.

Severity of Spyware Attacks Escalates

Despite dedicated software to defend the enterprise, the economics of spyware leads attackers to respond with more complex attacks or attacks aimed at just one company.