Security


IT Turns to SMTP-Level E-mail Blocking

New approaches focus on stopping unsolicited e-mail before it's even received

A Busy Month for Attackers

From anti-spam lawsuits to ever-more-clever hacking techniques, June was yet another month full of vulnerabilities for unsuspecting users.

In Brief

Windows XP security best practices, better SAML administration

DumpSec's Shortcomings Mask the Full Security Picture

Don’t let DumpSec fool you into a security comfort zone

Best Practices: Securing IM Against Attacks

Free instant messaging services are just one of the many security holes facing corporate IT

Attacks Against Financial Services Double

Already under the regulatory gun, attacks against the IT infrastructures of financial services firms have doubled in the last year



Briefs

A new Internet Explorer security flaw; heading off phishing attacks

Top Five Security Control Points Auditors Miss

Make sure you check these essential control points in any Windows network audit

Security Briefs

Active X Allows File Loading; Defining Spyware

Wireless Networks Continue to Bleed Data, Study Reveals

New study says 80 percent of companies have at least some unsecured wireless traffic

Rethinking Security/Network Boundaries

IT is reassessing how network administrators and security personnel can work together more effectively

Quantifying the Threat from Insiders

Your greatest security risk may not come from outside attacks but from your own employees. Setting policies and procedures aren't enough to stop the problem, but new security event management technology can help.

SCO Identity Manager Supports Single Sign-on Across Environments

A new Microsoft initiative eases management headaches by building management features into products that can be accessed by a variety of enterprise management tools. SCO's Vintela Authorization may give us a glimpse into how Microsoft networks can finally play nice with other operating systems.

Security Briefs: WiFi Attacks, Outlook Vulnerability

DoS attacks possible on 802.11 devices, public access points particularly vulnerable; tricking Outlook 2003 to download and run files

Four Criteria for Choosing a Distributed Security Solution

Only distributed security can protect the borderless enterprise from today's threats.

Case Study: Secure IM and Workspaces for Project Teams

Nektar Therapeutics security unites teams inside—and outside—the company

Security Companies to Congress: Listen Up

Vendors form Cyber Security Industry Alliance to coordinate Washington, boardroom approaches to security

Security Briefs

Despite Arrest, Worm Exploits Continue; Microsoft Help Vulnerability Revealed; Symantec Firewall Management Improved

Security Briefs: Worm Attacks Unpatched Computers; Apple Closes Vulnerability

Global organizations go offline to prevent Sasser damage; Apple patches QuickTime, OS X to close buffer overflow vulnerability