New software fixes mobile computers that deviate from corporate standards
New technology lets you hide and verify network identity inside the packets themselves.
TCP vulnerability exploit found in the wild; buffer overflow weakness uncovered in Microsoft PCT protocol
Forty percent of U.S. credit card fraud traced to handful of criminals from just five foreign countries; risk of punishment not a deterrent
Detect, then actively block, unauthorized WLAN users
By 2006, over half the U.S. workforce will be mobile. Security managers face a daunting task.
After years of merely reacting to new vulnerabilities, a centralized security model can no longer counter today's threats.
Security policies and education aren't enough
Encrypting information and keys in hardware
Cisco sign-on, IE cross-scripting lead vulnerabilities this week
When it comes to mobile devices, why do so many companies avoid the security issues?
Sneaking vulnerabilities into the enterprise through encrypted attachments pose new problems; ISPs will spend $245 million this year to combat problems, in large part because of home users.
Using pattern matching with information taxonomy tools to track sensitive information leaving the company
Only half of respondents in a new survey say their company has a written security policy. Furthermore, despite the increases in threats, many organizations have been slow to make the appropriate investments in time and budget to properly address them.
It's not just a matter of blocking unsolicited e-mail. Today's security professionals need to protect against outbound as well as inbound problems.
New report charts security manager dissatisfaction
As popularity of Linux grows, company predicts increasing attempts to create malicious programs that will attack it
WholeSecurity gives businesses the ability to offer their customers an opt-in PC security sweep to quarantine malicious software
New warnings about Web hosting control panel protection, ISS server-response processing, and Symantec's security software
Interest is growing in a new British Standard—BS7799—that is slowly being adopted outside of Britain; companies adopting the standard may find they've implemented a best-practices security program.