Acquisition of PestPatrol signals single-console management of viruses, spam, and spyware may not be far away.
Understanding what the security templates can provide could be invaluable.
New technology in a user-friendly toolbar intercepts users from visiting such sites
Exploits expected to get worse, putting even more pressure on security managers
Delaying XP Upgrades, AOL IM Buffer Overflow, Virus Source
Public key infrastructure isn't dead yet.
Use of the Internet for telephone calls brings to the fore how security concerns could now spread to your once-secure communications system.
This XP Service Pack should be called a Security Pack
Problems Found in Graphics Library, Mozilla, and PDAs
Samba Exploits, Dumping IE, and Securing iPaqs
While no single solution solves all problems, getting ahead of security problems can bring big rewards. Here's how to get started.
Free and paid instant messaging use will rise dramatically in the next four years
With personal e-mail available in an instant from any connected PC via free Web-mail accounts, users want to know why their corporate e-mail, applications, and documents can’t behave the same way.
New modules in the Linux 2.6 kernel make for easier host-based application security.
Verifying PC security compliance before granting network access
IM Migration Deals, Mobile Viruses, and Zip-File Vulnerabilities
Finally there's software to let enterprises remove spyware.
Microsoft details vulnerabilities (including extremely critical IE problems); safeguarding CAD drawings in your browser
System vulnerabilities can creep in through compressed files. But does completely blocking their use make for good security policy?
Forgetting to audit your local SAMs can prove disastrous