Security


Security Briefs

Hate sites and corporate liability; weak PDA data protection

Q&A: Stress Testing Your Network Against DoS Attacks

While most companies don’t face worms designed to turn computers against them, denial-of-service attacks remain a problem. How can organizations stress test their network against such attacks? We turned to Alan Newman of Spirent Communications, which manufacturers network stress-testing appliances and simulation software, for some ideas.

Case Study: Choosing Outside Help to Meet Security Regulations

Finding just the right provider can be tricky. How one company made its decision.

Protecting Customer Data at the Browser Level

Once information appears in a browser, users can copy or print it as they please. Security managers have a new option for safeguarding such content.

Tools to Secure Your System, Privacy, and Sanity

How can you know you haven't been connected to a look-alike server, and how does it know your device isn't infected with malware? New hardware specification models from the Trusted Computing Group may help.

Quantifying the Threat from Insiders

Your greatest security risk may not come from outside attacks but from your own employees. Setting policies and procedures aren't enough to stop the problem, but new security event management technology can help.



SCO Identity Manager Supports Single Sign-on Across Environments

A new Microsoft initiative eases management headaches by building management features into products that can be accessed by a variety of enterprise management tools. SCO's Vintela Authorization may give us a glimpse into how Microsoft networks can finally play nice with other operating systems.

Security Briefs: WiFi Attacks, Outlook Vulnerability

DoS attacks possible on 802.11 devices, public access points particularly vulnerable; tricking Outlook 2003 to download and run files

Four Criteria for Choosing a Distributed Security Solution

Only distributed security can protect the borderless enterprise from today's threats.

Case Study: Secure IM and Workspaces for Project Teams

Nektar Therapeutics security unites teams inside—and outside—the company

Security Companies to Congress: Listen Up

Vendors form Cyber Security Industry Alliance to coordinate Washington, boardroom approaches to security

Security Briefs

Despite Arrest, Worm Exploits Continue; Microsoft Help Vulnerability Revealed; Symantec Firewall Management Improved

Security Briefs: Worm Attacks Unpatched Computers; Apple Closes Vulnerability

Global organizations go offline to prevent Sasser damage; Apple patches QuickTime, OS X to close buffer overflow vulnerability

Dispelling Log Data Retention Myths

Retaining data isn't enough. IT faces a host of regulations that address maintaining log files—tracking who did what and when—along with the requiring access to them in very short order.

Survey: CEOs Crave Better Perimeter and Access Controls

Not knowing who’s accessing what is a recipe for auditing disasters

Security Briefs: April Recap, Can-Spam Charges, Eset's Antivirus Software

Top vulnerabilities include a virus and a Hotmail hoax; FTC charges spammers; NOD32 antivirus software for consumers and the enterprise

Case Study: Mohegan Sun Bets on Virtual Password Vault

The Connecticut casino and entertainment center uses password management software, which acts as an intermediary with applications, to ensure passwords are available—and secure—around the clock.

Host Intrusion Prevention: A New Approach to Keeping Systems Safe

Host-based intrusion prevention runs as a software agent on a user's system, looking for unauthorized actions

Security White Papers

White papers examine self-defending networks, managing security events, Wi-Fi security, and unsolicited e-mail