Security


Configuration Management Goes Mobile

New software fixes mobile computers that deviate from corporate standards

Cloaking Assets With Identity-Level Firewalls

New technology lets you hide and verify network identity inside the packets themselves.

Security Briefs: Two Protocol Vulnerabilities Disclosed

TCP vulnerability exploit found in the wild; buffer overflow weakness uncovered in Microsoft PCT protocol

American E-business Struggles with Global Fraud

Forty percent of U.S. credit card fraud traced to handful of criminals from just five foreign countries; risk of punishment not a deterrent

Disabling Rogue WLAN Access

Detect, then actively block, unauthorized WLAN users

Q&A: Securing Mobile Workers

By 2006, over half the U.S. workforce will be mobile. Security managers face a daunting task.

Five Signs Your Enterprise Needs Distributed Security

After years of merely reacting to new vulnerabilities, a centralized security model can no longer counter today's threats.



Worst Security Problem: Attachments

Security policies and education aren't enough

Case Study: Securing Mail Transactions in Any Form

Encrypting information and keys in hardware

In Brief

Cisco sign-on, IE cross-scripting lead vulnerabilities this week

Businesses Ignore Mobile PDA Threat

When it comes to mobile devices, why do so many companies avoid the security issues?

Security Briefs: Encrypted Attachments Carry Threats

Sneaking vulnerabilities into the enterprise through encrypted attachments pose new problems; ISPs will spend $245 million this year to combat problems, in large part because of home users.

Case Study: Stopping Leaks of Program Code

Using pattern matching with information taxonomy tools to track sensitive information leaving the company

Human Error Tops List of Vulnerabilities

Only half of respondents in a new survey say their company has a written security policy. Furthermore, despite the increases in threats, many organizations have been slow to make the appropriate investments in time and budget to properly address them.

Q&A: Single-System Message Management

It's not just a matter of blocking unsolicited e-mail. Today's security professionals need to protect against outbound as well as inbound problems.

Security Managers Report Virus Problem Worse

New report charts security manager dissatisfaction

F-Secure Targets Attacks on Linux

As popularity of Linux grows, company predicts increasing attempts to create malicious programs that will attack it

Combating Apathy with Free Security Check

WholeSecurity gives businesses the ability to offer their customers an opt-in PC security sweep to quarantine malicious software

Briefs: Vulnerabilities in CPanel, ISS products, Symantec Internet Security

New warnings about Web hosting control panel protection, ISS server-response processing, and Symantec's security software

Best Practices: New Standard Helps Companies Prove Their World-Class Security

Interest is growing in a new British Standard—BS7799—that is slowly being adopted outside of Britain; companies adopting the standard may find they've implemented a best-practices security program.