Security


Briefs

Voice-over-IP vulnerabilities; impact to Microsoft's ISA Server 2000

Battling Blended Threats with Pattern Detection

IT needs to move from looking at events coming from particular sensors to recognizing patterns of activity coming into that infrastructure.

Securing Mobile Workers

The wireless debate has moved from demonstrating that wireless is a viable technology to solving the associated management issues. New software and upgrades may hold the answer.

Case Study: Watching Sensitive Database Information at Toro

Sarbanes-Oxley, the need to improve monitoring, and a desire to move administration and accountability closer to end users, drove Toro to invest in record-level enterprise application monitoring software from Prodigen.

Briefs

Using investigations to satisfy Sarbanes-Oxley requirements; learning from 2003's vulnerability onslaught

BRIEFS: Network Storage Rules; Anti-Virus Software; Choosing a Mail Filter

Learn Network Storage Security Rules; Free Anti-Virus (For A Year)



Report: Last Year Was Worst Ever for Viruses

Last year was the worst year ever for vulnerabilities, says anti-virus software maker F-Secure, in part because virus writers and spammers got together. Here's what you can do to prepare.

Which Bugs Will Bite? Vulnerability Predictions for 2004

Heterogeneous attacks, voice over IP shakedown, and prime time Web services easing security: predictions from an eminent security researcher for 2004 and beyond.

Q&A: Arresting Bugs Earlier in Development Cycle Cuts Security Costs

How integrating security code testing into the development cycle saves time and dollars

Mainframe Security: Good Enough for the 21st Century?

The mainframe is the hub of a network of connected devices, making it ever more vulnerable to attacks.

Commentary: Solving Internet Crime Needs International Approach

Governments have made cyber-crime a matter of public policy. But without an organized, multi-disciplinary, international approach, the problem will remain.

Alerts: Linux Vulnerabilities, Security Spending, Symantec's List of Top Threats in November

From Linux synchronization and denial of service attacks to some good news about spending on security—a quick look at this week's other security news.

Q&A: Protecting Web Applications from Unknown Attacks

Companies must protect their data as well as their reputations.

Security Budgets Will Rise Rapidly, Researchers Predict

Top growth areas: firewalls, IDS/IPS, virus scanning, and vulnerability assessment. By 2005, security managers plan to buy all-in-one appliances that combine these functions. Infonetics Research also

Alerts: Oracle Patch; Top Viruses for November; Yahoo Messenger Vulnerability

Oracle releases most, but not all patches, necessary to protect against SSL vulnerability. Kaspersky Labs reveals the top troublemakers in November. Yahoo's popular instant messaging program vulnerabilities.

Case in Point: Law Firm Battles Spam

Installing a spam filter helped one Atlanta firm eliminate 95% of unsolicited e-mail.

Security Attacks More Varied and Aggressive, ISS Report Shows

Security incidents are up 15 percent, and the gap between vulnerability disclosure and exploit shrinks

Best Practices: Avoiding Computer Worms

F-Secure releases a dozen tips to help users avoid common worm problems

Quantum Cryptography Offers Uncrackable Keys

Using the laws of physics, not mathematical difficulty, to secure data, MagiQ Technologies' Navajo Security Gateway offers "future-proof, unbreakable" security devices.