From anti-spam lawsuits to ever-more-clever hacking techniques, June was yet another month full of vulnerabilities for unsuspecting users.
Windows XP security best practices, better SAML administration
Don’t let DumpSec fool you into a security comfort zone
Free instant messaging services are just one of the many security holes facing corporate IT
New approaches focus on stopping unsolicited e-mail before it's even received
Security becomes a boardroom issue
Already under the regulatory gun, attacks against the IT infrastructures of financial services firms have doubled in the last year
A new Internet Explorer security flaw; heading off phishing attacks
Make sure you check these essential control points in any Windows network audit
Active X Allows File Loading; Defining Spyware
New study says 80 percent of companies have at least some unsecured wireless traffic
IT is reassessing how network administrators and security personnel can work together more effectively
New approaches make it easier than ever to add network-wide transparent data encryption
Vulnerabilities target mobile devices, RealPlayer; Tivoli adds .NET support
When evaluating security products for your enterprise, make sure you also evaluate the vendors themselves using these criteria.
Keep an eye out for these five common mistakes
New vulnerability erases hard drives; open source tool at risk; Oracle SQL exposure
Even laptops with hard drives that had been erased and defragged were easily hacked to reveal company secrets
Symantec's head of Managed Security Services offers his perspective on what you should look for when considering a move to outsourced security
To resist downtime and attacks, many organizations are turning to security event management software, which collects and analyzes information from a variety of devices, PCs, servers, and firewalls, giving security administrators a consolidated view of network security.