Security


In Brief

Continuing Internet Explorer vulnerabilities; FTC sweep for GLBA compliance snares two companies

Q&A: Open Source Network Vulnerability Scanners

Vulnerability management is no longer about maintaining perfectly patched machines.

Ten Group Policy Settings To Ensure Consistent Windows Security

Some of Windows' settings affect domain controllers, where others affect all computers. To ensure that your security foundation is properly established, use Group Policy objects to deploy and configure your security settings.

Case Study: Protecting Hospitals’ Increasingly Networked Systems

HIPAA mandates penalties for data disclosure. Here's how a hospital went about finding an intrusion detection solution.

In Brief

Problems with Adobe Acrobat, Microsoft .NET, and phpMyAdmin

Critics Blast Cybersecurity at Department of Homeland Security

When it comes to information security, does the U.S. Department of Homeland Security have a blind spot?

Untangling Endpoint Security Initiatives

Two Endpoint security initiatives are underway—one from Cisco, the other from Microsoft. We take a closer look at these plus the evolution of endpoint security.



HP Throttles Viruses, Cracks OpenView Identity

The latest security announcements from Hewlett-Packard

Ensuring Group Policy Security Settings Are Consistent

Security settings deployed with Group Policy are highly efficient but not guaranteed by default. With a few extra steps you can guarantee that these security settings apply persistently to computers.

Top Ten Security Trends for 2005

What's in store for information security

In Brief

Charting spyware growth, identity theft at universities, safer Web browsing

New Enterprise Tools Attack Spyware

Spyware is a moving target. Pushing out one level of filters just doesn’t cut it any more.

Case Study: Outsourced Network Security Uses Behavioral Modeling

The Yankee Group predicts that by 2010, 90 percent of all security will be outsourced. Here's how one company made its decision to choose a pro-active security solution.

In Brief

Microsoft, Solaris vulnerabilities; top spyware threats; IPS use rising

In Brief

Database and Imsecure vulnerabilities, search software flaw enables sophisticated phishing attack

Case Study: Securing Network Bandwidth

A packet-shaping tool can help handle worm outbreaks.

Q&A: Can Wireless Networks Be Secured?

Denial is not a legitimate wireless strategy

Case Study: Finding and Fixing Security-Related Code Defects

Finding code problems was the challenge; a service provider's analysis held the answer

Microsoft and IBM Hone Security Warning Systems

Better security updates in the offing

In Brief

Microsoft ISA vulnerability may lead to phishing attacks, a new version of MyDoom targets the IFRAME vulnerability in IE, and survey finds bank clients willing to defect over banks’ lack of ID theft protections