Security


ASN Security Issues Run Deep, Forrester Warns

Security flaws reveal weaknesses in Microsoft's Abstract Syntax Notation One, a cryptographic and authentication mechanism in use by every Window operating system. The problem is with the compiler, not the applications themselves. It's time for developers to patch and recompile quickly.

E-business Profits: Gone with the Criminal?

Viruses are not the only reason why interest in e-business is declining. Hackers and fraudsters are also to blame.

Case Study: Securing Systems You Don't Directly Control

The University of Colorado Hospital struggled to keep its network secure to comply with HIPAA regulations, made difficult because IT didn't have direct control over some connected systems.

New Breed of Attack Targets Microsoft Outlook XP Users

Microsoft upgrades Outlook XP's vulnerability to "critical" after researcher finds additional flaws; company urges patch be applied quickly

February Sets Virus Record

Kaspersky Labs' Top Twenty list of vulnerabilities reveals e-mail viruses were never more plentiful.

Case Study: Protecting Intellectual Property on the Go

Kettering Medical Center finds a solution to who sees the data, for how long, and how much data a user can view.

Worm Writers One-Up Each Other

The battle to capture your e-mail address has gone to new levels: deleting competing worms.



Touching SAP Data: User Access and Biometrics

Enterprises can record when users access data in an SAP system, but biometrics makes it possible to add physical evidence to the log.

Compartmentalize Your Network to Improve Security

An often-overlooked layer of defense can provide last-ditch protection against malicious software threats.

Alerts

New Vulnerabilities Steal Financial Data Via ICQ, Target P2P File Traders, and Delete Office Files

Q&A: Managing Security Through Enterprise Procurement

Simplifying the time-consuming process of setting up security, and changing security permissions quickly, can often be handled through procurement software.

Case Study: Meeting Customer Demand for Secure Statements

Rather than navigating a Web site to see their data, customers at New York Life Investment Management Retirement Services enter only a username and password to see statements in an HTML e-mail attachment.

Microsoft Says Security Improvements Coming

The company is querying its user base for security enhancements; meanwhile, security option defaults will be changed in future releases and updates.

Briefs

E-mail fraud and vulnerabilities, plus the impact of Microsoft's source code leak

Case Study: Fielding Service Calls Securely

Securing common, Internet-connected, mobile devices requires a new approach. Schindler Elevator Corp. found one.

Effective Data Auditing for Regulatory Compliance: Options and Considerations

Auditing can do more than just help you meet a host of new regulations. Last week we outlined several significant business benefits. This week we explore your options. (Second in a two-part series.)

Alerts

Sarbanes-Oxley; partnering for security; security certification guide

Q&A: Real-Time Database Monitors May Ease Regulatory Headaches

Near-real-time monitoring may help your company catch attackers and restore altered data.

Security Briefs

Microsoft Warns of Critical ASN.1 Vulnerability; More Doom Unleashed

Ten Business Benefits of Effective Data Auditing

Auditing can do more than just help you meet a host of new government regulations. The author outlines the significant business benefits from a solid data-auditing program and explains the basic requirements of such a solution. (Part one of a two-part series.)