Voice-over-IP vulnerabilities; impact to Microsoft's ISA Server 2000
IT needs to move from looking at events coming from particular sensors to recognizing patterns of activity coming into that infrastructure.
The wireless debate has moved from demonstrating that wireless is a viable technology to solving the associated management issues. New software and upgrades may hold the answer.
Sarbanes-Oxley, the need to improve monitoring, and a desire to move administration and accountability closer to end users, drove Toro to invest in record-level enterprise application monitoring software from Prodigen.
Using investigations to satisfy Sarbanes-Oxley requirements; learning from 2003's vulnerability onslaught
Learn Network Storage Security Rules; Free Anti-Virus (For A Year)
Last year was the worst year ever for vulnerabilities, says anti-virus software maker F-Secure, in part because virus writers and spammers got together. Here's what you can do to prepare.
Heterogeneous attacks, voice over IP shakedown, and prime time Web services easing security: predictions from an eminent security researcher for 2004 and beyond.
How integrating security code testing into the development cycle saves time and dollars
The mainframe is the hub of a network of connected devices, making it ever more vulnerable to attacks.
Governments have made cyber-crime a matter of public policy. But without an organized, multi-disciplinary, international approach, the problem will remain.
From Linux synchronization and denial of service attacks to some good news about spending on security—a quick look at this week's other security news.
Companies must protect their data as well as their reputations.
Top growth areas: firewalls, IDS/IPS, virus scanning, and vulnerability assessment. By 2005, security managers plan to buy all-in-one appliances that combine these functions. Infonetics Research also
Oracle releases most, but not all patches, necessary to protect against SSL vulnerability. Kaspersky Labs reveals the top troublemakers in November. Yahoo's popular instant messaging program vulnerabilities.
Installing a spam filter helped one Atlanta firm eliminate 95% of unsolicited e-mail.
Security incidents are up 15 percent, and the gap between vulnerability disclosure and exploit shrinks
F-Secure releases a dozen tips to help users avoid common worm problems
Using the laws of physics, not mathematical difficulty, to secure data, MagiQ Technologies' Navajo Security Gateway offers "future-proof, unbreakable" security devices.