Security


In Brief

Prosecuting Spyware Makers, A New Endpoint Security Standard

Case Study: Continental Secures Remote Access, Trims Costs

Sometimes the drive for better security can also bring cost savings.

Q&A: Is Microsoft's Security Trustworthy?

Three years after Microsoft launched an initiative to improve its products’ security, we talk to information security veteran Gary Morse, president of Razorpoint Security Technologies, about the results.

SANS Top Vulnerability List Gets Quarterly Updates

List helps prioritize vulnerability patching

In Brief

Sober.V Spreads, Apple Fixes 20 OS X Vulnerabilities, Mytob Tops Virus List

Q&A: Enterprises Shift to All-in-One Security Appliances

Why use separate firewall, intrusion detection and prevention, gateway antivirus, and VPN products when one appliance can handle it all?



Q&A: The Future of Service-Oriented Architecture Security

WS-Security, Liberty, and SAML play nice together

In Brief

Data Storage Security a Concern; Symantec’s 64-Bit Antivirus; Multiple Mozilla, Netscape Vulnerabilities

All Quiet on the Security Front?

Has the absence of a big security threat lulled you into inaction?

Your Next Battle Front: Network-Based Worms

As the effectiveness of e-mail worms decreases, attackers turn to network-based worms.

In Brief

Eight Firefox Vulnerabilities; Microsoft Previews Longhorn Security; Windows XP SP2 Rollout Lags

Q&A: How to Assess Pharming Threats

Pharming attacks are on the rise. Should your organization be concerned?

In Brief

Ten Microsoft Problems; Lotus Notes and Domino Vulnerabilities

Spend Less, Secure More

Companies that better target their security spending actually spend less and have more effective security programs

Q&A: How to Secure a Critical Infrastructure

A cybersecurity group works to improve security in the chemical industry.

Database Security Requires a Multi-Pronged Approach

Regulations are leading organizations toward automated database intrusion prevention, auditing, and encryption

Q&A: Security Best Practices Include Automated Remediation

Automated vulnerability remediation exists, but most companies still take a manual approach

Your Stake in Data Auditing - Part 2 of 2

What auditors and database administrators need to know

In Brief

Executives Decry Cost of SOX, IM Security Still a Concern, and a Mobile Phone Worm Evolves