Securing common, Internet-connected, mobile devices requires a new approach. Schindler Elevator Corp. found one.
Auditing can do more than just help you meet a host of new regulations. Last week we outlined several significant business benefits. This week we explore your options. (Second in a two-part series.)
Sarbanes-Oxley; partnering for security; security certification guide
Near-real-time monitoring may help your company catch attackers and restore altered data.
Microsoft Warns of Critical ASN.1 Vulnerability; More Doom Unleashed
Auditing can do more than just help you meet a host of new government regulations. The author outlines the significant business benefits from a solid data-auditing program and explains the basic requirements of such a solution. (Part one of a two-part series.)
Companies turn to managed Service providers for help; desktops dominate security budgets as patches average $234 per machine.
Newest vulerabilities feed on old worm to take aim at Microsoft's Web site
Best practices in keeping the desktop secure
New Mydoom variants; Vulnerabilities in IE browser, Checkpoint products; January a banner month for threats.
Encrypting, monitoring, and auditing access to actual data
New legislation has failed to stem the tide of unsolicited e-mail, protecting e-mailers who follow the letter but not the spirit of the law.
The latest threats have companies reconsidering their anti-virus tools, wondering if AV is becoming irrelevant. Increasingly, companies are looking at application-level personal firewalls and all-in-one gateway hardware for PCs.
MyDoom monopolizes Internet via e-mail harvesting, P2P file sharing, back door
Coding errors in Web Services code at your partners can trigger problems on your own systems.
Third-party testing firm analyzes leading IDS products, encounters surprises.
New worm and Trojan software unleashed; purported PayPal mail carries worm
Microsoft's Penny Black solution may impose fees on those sending unsolicited e-mail, while a service from Vanquish adds economic penalties for such messages.
Gathering information in a legal, court-friendly way is vital if computer forensic evidence is to hold up in court.