Security


Best Practices: Security Budgeting for 2005

IT must cope with under-funded regulations, more CIO leeway

In Brief

RealPlayer and JPEG vulnerabilities; security insurance

Patch or Perish: Symantec Notes Dramatic Increase in Threats

Symantec's assessment of system vulnerabilities in the first half of this year shows a dramatic increase in the number and potential destruction of security threats.

Smart Cards Gear Up For Biometrics

Smart cards, currently a favorite of governments and large corporations, are getting more powerful, incorporating Java and USB technologies.

In Brief

Banks help ID thieves; unified security appliances; server security

In Brief

Symantec grabs @Stake; JPEG vulnerabilities; Mozilla holes; Sniffer worm

Best Practices: IM Monitoring

Under pressure from such regulations as HIPAA, the Gramm-Leach-Bliley Act, and Sarbanes-Oxley, companies increasingly have to account for their corporate instant messaging policies. Yet many organizations don’t have rules for IM use.



Case Study: Outsourcing Network Management and Security

How one company found an outsourcer able to manage its network equipment and offer cogent security advice

Case Study: Law Firm Isolates Potential Threats

Office uses one-stop monitoring for attacks and vulnerabilities

In Brief

New security legislation; the future of e-mail and IM security

Inside Attackers Often Unremarkable, Warns CERT

Most attacks are relatively unsophisticated, planned in advance, conducted during normal business hours, and start from inside the organization. The common driver comes as no surprise: money.

Yankee Group Says Security Outsourcing Set to Explode

Managed security service providers to dominate security market by 2010

In Brief

Most unsolicited e-mail originates in U.S., survey finds; securing storage; name-dropping attacks

Digital Certificates Get Pentagon, Regulatory Boost

Once they seemed doomed, but public key infrastructure is taking off, driven by e-commerce servers, Pentagon requirements, and government regulations.

Five Steps to Enforcing Your Endpoint Security

Your security policy has to have teeth. Here's how to enforce your endpoint security policy.

Security Briefs

Sun Solaris/Apache, Netscape/Sun, Winamp Vulnerabilities

Passing the WLAN Security Buck

Company offers outsourced wireless LAN to overcome security vulnerabilities

Briefs

More XP SP2 woes, fraud awareness survey, Can-Spam's failure