Security flaws reveal weaknesses in Microsoft's Abstract Syntax Notation One, a cryptographic and authentication mechanism in use by every Window operating system. The problem is with the compiler, not the applications themselves. It's time for developers to patch and recompile quickly.
Viruses are not the only reason why interest in e-business is declining. Hackers and fraudsters are also to blame.
The University of Colorado Hospital struggled to keep its network secure to comply with HIPAA regulations, made difficult because IT didn't have direct control over some connected systems.
Microsoft upgrades Outlook XP's vulnerability to "critical" after researcher finds additional flaws; company urges patch be applied quickly
Kaspersky Labs' Top Twenty list of vulnerabilities reveals e-mail viruses were never more plentiful.
Kettering Medical Center finds a solution to who sees the data, for how long, and how much data a user can view.
The battle to capture your e-mail address has gone to new levels: deleting competing worms.
Enterprises can record when users access data in an SAP system, but biometrics makes it possible to add physical evidence to the log.
An often-overlooked layer of defense can provide last-ditch protection against malicious software threats.
New Vulnerabilities Steal Financial Data Via ICQ, Target P2P File Traders, and Delete Office Files
Simplifying the time-consuming process of setting up security, and changing security permissions quickly, can often be handled through procurement software.
Rather than navigating a Web site to see their data, customers at New York Life Investment Management Retirement Services enter only a username and password to see statements in an HTML e-mail attachment.
The company is querying its user base for security enhancements; meanwhile, security option defaults will be changed in future releases and updates.
E-mail fraud and vulnerabilities, plus the impact of Microsoft's source code leak
Securing common, Internet-connected, mobile devices requires a new approach. Schindler Elevator Corp. found one.
Auditing can do more than just help you meet a host of new regulations. Last week we outlined several significant business benefits. This week we explore your options. (Second in a two-part series.)
Sarbanes-Oxley; partnering for security; security certification guide
Near-real-time monitoring may help your company catch attackers and restore altered data.
Microsoft Warns of Critical ASN.1 Vulnerability; More Doom Unleashed
Auditing can do more than just help you meet a host of new government regulations. The author outlines the significant business benefits from a solid data-auditing program and explains the basic requirements of such a solution. (Part one of a two-part series.)