Security


Top Three Security Problems Remain Despite Increased Spending

Companies turn to managed Service providers for help; desktops dominate security budgets as patches average $234 per machine.

MyDoom Details from Kaspersky Labs

Newest vulerabilities feed on old worm to take aim at Microsoft's Web site

Solving the Patch Management Headache

Best practices in keeping the desktop secure

Briefs

New Mydoom variants; Vulnerabilities in IE browser, Checkpoint products; January a banner month for threats.

Beyond Perimeter Defense: Securing Online Transactions

Encrypting, monitoring, and auditing access to actual data

Can-Spam, Laced with Loopholes, Creates Confusion

New legislation has failed to stem the tide of unsolicited e-mail, protecting e-mailers who follow the letter but not the spirit of the law.



Companies Defect as Anti-virus Software Struggles with Worms

The latest threats have companies reconsidering their anti-virus tools, wondering if AV is becoming irrelevant. Increasingly, companies are looking at application-level personal firewalls and all-in-one gateway hardware for PCs.

First Worm Outbreak of the Year Packs a Wallop

MyDoom monopolizes Internet via e-mail harvesting, P2P file sharing, back door

Guarding Against Your Partner's Web Services Flaws

Coding errors in Web Services code at your partners can trigger problems on your own systems.

Product Shootout: Intrusion Prevention

Third-party testing firm analyzes leading IDS products, encounters surprises.

Briefs

New worm and Trojan software unleashed; purported PayPal mail carries worm

Reducing Unsolicited E-Mail: Making Senders Pay

Microsoft's Penny Black solution may impose fees on those sending unsolicited e-mail, while a service from Vanquish adds economic penalties for such messages.

Best Practices: Collecting Computer Forensic Evidence

Gathering information in a legal, court-friendly way is vital if computer forensic evidence is to hold up in court.

Briefs

Voice-over-IP vulnerabilities; impact to Microsoft's ISA Server 2000

Battling Blended Threats with Pattern Detection

IT needs to move from looking at events coming from particular sensors to recognizing patterns of activity coming into that infrastructure.

Securing Mobile Workers

The wireless debate has moved from demonstrating that wireless is a viable technology to solving the associated management issues. New software and upgrades may hold the answer.

Case Study: Watching Sensitive Database Information at Toro

Sarbanes-Oxley, the need to improve monitoring, and a desire to move administration and accountability closer to end users, drove Toro to invest in record-level enterprise application monitoring software from Prodigen.

Briefs

Using investigations to satisfy Sarbanes-Oxley requirements; learning from 2003's vulnerability onslaught

BRIEFS: Network Storage Rules; Anti-Virus Software; Choosing a Mail Filter

Learn Network Storage Security Rules; Free Anti-Virus (For A Year)