Highly critical IE vulnerability lacks patch; new attacks reanimate mobile AV
Setting the open-source security record straight
To more rapidly test patches and keep network configurations from drifting, keep a closer watch on every device’s configuration
Passwords protect user logon and resource access, but only if the underlying authentication protocols are secure. Here's how to overcome vulnerabilities of older protocols.
Blame unusable security, not users; Apple worm; high-speed IPS
New security-risk management tools bridge the security/business gap
With the November 15 deadline looming for many organizations, many companies still don’t have a plan for auditing and archiving instant messages.
Antivirus and browser vulnerabilities, unsubscribe may be unwise
Free hard-drive indexing utility raises corporate security and privacy questions
As more organizations embrace Web services (which opens back-office processes to partners and the Internet), a problem is emerging: who inside the organization is in charge of Web services security?
Domain name registrar copes with DoS spike
Top 20 Windows/Unix vulnerabilities, Microsoft flaws and fixes
Identifying business assets to aid threat mitigation
There are two primary methods for auditing computers with security templates: manually and using a script command. We explain the benefits and drawbacks of each.
How one financial company distributes secure information to its board of directors, many of whom work in an insecure environment
Human error and security; AOL's two-factor authentication; September viruses
Increasingly, PCs must prove they're secure before a user can log onto the network
Knowing how today's hackers think and work is the first step to combating their attacks.
Creating a baseline of security for servers and clients is essential for a secure environment.
Software vaults are increasingly the solution for securing passwords, notes from the board of directors, and more