Companies turn to managed Service providers for help; desktops dominate security budgets as patches average $234 per machine.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Newest vulerabilities feed on old worm to take aim at Microsoft's Web site
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Best practices in keeping the desktop secure
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    New Mydoom variants; Vulnerabilities in IE browser, Checkpoint products; January a banner month for threats.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Encrypting, monitoring, and auditing access to actual data
                    
		            
                
                    
                    
                    
                 
            
                
            
                
	                
                    
                                        
		            
                    New legislation has failed to stem the tide of unsolicited e-mail, protecting e-mailers who follow the letter but not the spirit of the law.
                    
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    The latest threats have companies reconsidering their anti-virus tools, wondering if AV is becoming irrelevant.  Increasingly, companies are looking at application-level personal firewalls and all-in-one gateway hardware for PCs.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    MyDoom monopolizes Internet via e-mail harvesting, P2P file sharing, back door
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Coding errors in Web Services code at your partners can trigger problems on your own systems.  
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Third-party testing firm analyzes leading IDS products, encounters surprises.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    New worm and Trojan software unleashed; purported PayPal mail carries worm
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Microsoft's Penny Black solution may impose fees on those sending unsolicited e-mail, while a service from Vanquish adds economic penalties for such messages.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Gathering information in a legal, court-friendly way is vital if computer forensic evidence is to hold up in court.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Voice-over-IP vulnerabilities; impact to Microsoft's ISA Server 2000
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    IT needs to move from looking at events coming from particular sensors to recognizing patterns of activity coming into that infrastructure.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The wireless debate has moved from demonstrating that wireless is a viable technology to solving the associated management issues. New software and upgrades may hold the answer.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Sarbanes-Oxley, the need to improve monitoring, and a desire to move administration and accountability closer to end users, drove Toro to invest in record-level enterprise application monitoring software from Prodigen. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Using investigations to satisfy Sarbanes-Oxley requirements; learning from 2003's vulnerability onslaught
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Learn Network Storage Security Rules; Free Anti-Virus (For A Year)