Security


CA Jumps into Anti-Spyware Market

Acquisition of PestPatrol signals single-console management of viruses, spam, and spyware may not be far away.

Top Six Settings in Windows Security Templates

Understanding what the security templates can provide could be invaluable.

Web Caller-ID Arrests Spoof Sites

New technology in a user-friendly toolbar intercepts users from visiting such sites

New Technology Combats Zero-Day Attacks

Exploits expected to get worse, putting even more pressure on security managers

In Brief

Delaying XP Upgrades, AOL IM Buffer Overflow, Virus Source

Digital Certificates Secure Web Services, Mobile Communications

Public key infrastructure isn't dead yet.

VoIP Growth Brings Focus on Security Holes

Use of the Internet for telephone calls brings to the fore how security concerns could now spread to your once-secure communications system.



Top 10 Security Modifications in Windows XP Service Pack 2

This XP Service Pack should be called a Security Pack

Briefs

Problems Found in Graphics Library, Mozilla, and PDAs

In Brief

Samba Exploits, Dumping IE, and Securing iPaqs

Five Steps to Make Your Security More Proactive

While no single solution solves all problems, getting ahead of security problems can bring big rewards. Here's how to get started.

Regulations, Productivity Spark Enterprise IM Adoption

Free and paid instant messaging use will rise dramatically in the next four years

Case Study: UCI Cinema Adopts SSL VPN for Anytime, Anywhere Access

With personal e-mail available in an instant from any connected PC via free Web-mail accounts, users want to know why their corporate e-mail, applications, and documents can’t behave the same way.

Linux Gets Host Application Security

New modules in the Linux 2.6 kernel make for easier host-based application security.

Locking Down Endpoints to Prevent Virus Resurgence

Verifying PC security compliance before granting network access

Briefs

IM Migration Deals, Mobile Viruses, and Zip-File Vulnerabilities

Q&A: Eradicating Spyware in the Enterprise

Finally there's software to let enterprises remove spyware.

Briefs

Microsoft details vulnerabilities (including extremely critical IE problems); safeguarding CAD drawings in your browser

Case Study: Managing Zip Files with Security Controls

System vulnerabilities can creep in through compressed files. But does completely blocking their use make for good security policy?

Top 10 Control Points For Your Local SAM

Forgetting to audit your local SAMs can prove disastrous