Security


A Busy Month for Attackers

From anti-spam lawsuits to ever-more-clever hacking techniques, June was yet another month full of vulnerabilities for unsuspecting users.

In Brief

Windows XP security best practices, better SAML administration

DumpSec's Shortcomings Mask the Full Security Picture

Don’t let DumpSec fool you into a security comfort zone

Best Practices: Securing IM Against Attacks

Free instant messaging services are just one of the many security holes facing corporate IT

IT Turns to SMTP-Level E-mail Blocking

New approaches focus on stopping unsolicited e-mail before it's even received

Attacks Against Financial Services Double

Already under the regulatory gun, attacks against the IT infrastructures of financial services firms have doubled in the last year



Briefs

A new Internet Explorer security flaw; heading off phishing attacks

Top Five Security Control Points Auditors Miss

Make sure you check these essential control points in any Windows network audit

Security Briefs

Active X Allows File Loading; Defining Spyware

Wireless Networks Continue to Bleed Data, Study Reveals

New study says 80 percent of companies have at least some unsecured wireless traffic

Rethinking Security/Network Boundaries

IT is reassessing how network administrators and security personnel can work together more effectively

Q&A: New Technology For Encrypting Sensitive, Stored Data

New approaches make it easier than ever to add network-wide transparent data encryption

Security Briefs

Vulnerabilities target mobile devices, RealPlayer; Tivoli adds .NET support

Four Criteria for Evaluating a Security Vendor

When evaluating security products for your enterprise, make sure you also evaluate the vendors themselves using these criteria.

Top Five Errors Enterprise Windows Administrators Make

Keep an eye out for these five common mistakes

Security Briefs

New vulnerability erases hard drives; open source tool at risk; Oracle SQL exposure

Used Laptops Offer Secrets for Sale—Cheap

Even laptops with hard drives that had been erased and defragged were easily hacked to reveal company secrets

Q&A: Top Tips for Outsourcing Security

Symantec's head of Managed Security Services offers his perspective on what you should look for when considering a move to outsourced security

Security Event Management: It Pays to be Proactive

To resist downtime and attacks, many organizations are turning to security event management software, which collects and analyzes information from a variety of devices, PCs, servers, and firewalls, giving security administrators a consolidated view of network security.