IT must cope with under-funded regulations, more CIO leeway
RealPlayer and JPEG vulnerabilities; security insurance
Symantec's assessment of system vulnerabilities in the first half of this year shows a dramatic increase in the number and potential destruction of security threats.
Smart cards, currently a favorite of governments and large corporations, are getting more powerful, incorporating Java and USB technologies.
Banks help ID thieves; unified security appliances; server security
Symantec grabs @Stake; JPEG vulnerabilities; Mozilla holes; Sniffer worm
Under pressure from such regulations as HIPAA, the Gramm-Leach-Bliley Act, and Sarbanes-Oxley, companies increasingly have to account for their corporate instant messaging policies. Yet many organizations don’t have rules for IM use.
How one company found an outsourcer able to manage its network equipment and offer cogent security advice
Office uses one-stop monitoring for attacks and vulnerabilities
New security legislation; the future of e-mail and IM security
Most attacks are relatively unsophisticated, planned in advance, conducted during normal business hours, and start from inside the organization. The common driver comes as no surprise: money.
Managed security service providers to dominate security market by 2010
Most unsolicited e-mail originates in U.S., survey finds; securing storage; name-dropping attacks
Once they seemed doomed, but public key infrastructure is taking off, driven by e-commerce servers, Pentagon requirements, and government regulations.
Your security policy has to have teeth. Here's how to enforce your endpoint security policy.
Aeroplan adopts an XML firewall
Sun Solaris/Apache, Netscape/Sun, Winamp Vulnerabilities
Company offers outsourced wireless LAN to overcome security vulnerabilities
More XP SP2 woes, fraud awareness survey, Can-Spam's failure