Security


In Brief

Highly critical IE vulnerability lacks patch; new attacks reanimate mobile AV

Does Open-Source Software Mean Better Security?

Setting the open-source security record straight

Best Practices: Patch Management

To more rapidly test patches and keep network configurations from drifting, keep a closer watch on every device’s configuration

Defending Against Weak Authentication Protocols and Passwords

Passwords protect user logon and resource access, but only if the underlying authentication protocols are secure. Here's how to overcome vulnerabilities of older protocols.

In Brief

Blame unusable security, not users; Apple worm; high-speed IPS

Bias-Free Security Testing

New security-risk management tools bridge the security/business gap

Missing from SOX Compliance Efforts: IM Audits, Archives

With the November 15 deadline looming for many organizations, many companies still don’t have a plan for auditing and archiving instant messages.



In Brief

Antivirus and browser vulnerabilities, unsubscribe may be unwise

Google Desktop Search Tool Raises Security Concerns

Free hard-drive indexing utility raises corporate security and privacy questions

Ten Best Practices to Secure Web Services

As more organizations embrace Web services (which opens back-office processes to partners and the Internet), a problem is emerging: who inside the organization is in charge of Web services security?

Thwarting Next-Generation Denial-of-Service Attacks

Domain name registrar copes with DoS spike

In Brief

Top 20 Windows/Unix vulnerabilities, Microsoft flaws and fixes

Q&A: Using Business Rules to Tackle Vulnerabilities

Identifying business assets to aid threat mitigation

Auditing Security Baselines with Security Templates

There are two primary methods for auditing computers with security templates: manually and using a script command. We explain the benefits and drawbacks of each.

Case Study: Credit Union Encrypts Data onto Secure USB Keys

How one financial company distributes secure information to its board of directors, many of whom work in an insecure environment

In Brief

Human error and security; AOL's two-factor authentication; September viruses

Endpoint Security Grows But Interoperability Questions Remain

Increasingly, PCs must prove they're secure before a user can log onto the network

Understanding the New Breed of Hackers

Knowing how today's hackers think and work is the first step to combating their attacks.

Using Windows Security Templates for Baselines

Creating a baseline of security for servers and clients is essential for a secure environment.

Software Vaults Protect Sensitive Information

Software vaults are increasingly the solution for securing passwords, notes from the board of directors, and more