Security


Top Twenty Virus List for October 2003

A newcomer dominates this month's list

Alert: British Security Suffers; Apple Patches 14 Vulnerabilities

A new report from McAfee examines European companies' vulnerabilities.

Management's Holy Grail: Integrating Identity and Access Control

Six modules in Computer Associates' new eTrust Identity and Access Management Suite, used in any combination, provide an integrated solution to managing identities, from provisioning to enforcement.

Case Study: Hurricane Stress Tests Firewall at Weather.com

The company's VP of technology weighs in on integrating security able to scale rapidly and fail well.

Alert: Novell Patches Multiple iChain

Novell beta support pack fixes multiple “highly critical” vulnerabilities. We explain the problem and what you can do about it.

Security Managers Fear Next Generation of Attacks Says Survey

NetScreen survey also reports a widespread belief that current security set-ups are inadequate to defend against these threats

XML: A Growing Security Threat?

The data-swapping standard, now incorporated into Microsoft's Office 2003, may be the next big route for malicious attacks.



Sharing Hardware Cryptography No Longer Enough

It's no longer enough just to use encryption. Now what's important is how well you've used encryption, how well you administer it, and how well you can prove to auditors what you're doing.

Alert: Windows Messenger Service Vulnerability

Buffer overflow attack could give the attacker administrative privileges

Companies Miss Strategic Security Focus, PricewaterhouseCoopers Says

The problem: how to support an "always on" environment.

Network Associates Puts Up Shield Around Microsoft’s SharePoint

Network Associates launches comprehensive security package for Microsoft’s new SharePoint portal server and associated tools

Q&A: Mitigating the Denial of Service Threat

Security consultant details ways to protect yourself

Best Practices: Five Tips for Managed Security Outsourcing

Yankee Group’s recommendations for getting the most from managed security outsourcing

Dangerous Blended Attacks Increase, Symantec Says

Payload and speed make them especially dangerous; eight best practices for resisting their impact

State Department Blames Welchia Virus For Shutdown

Visa applicants left high and dry as government database hit with virus

Q&A: Securing the Door as Important as Securing the Data

Organizations regard the intersection of physical and electronic security—holistic security, if you will—as the end goal

Alerts: New IE Exploit Hacks DNS; Kaspersky Labs' Top Ten Viruses for September

Anti-virus vendors report MS patch does not protect against Trojan Qhosts; September's list of top ten viruses

Best Practices: Minimizing the Risk of Forgotten Modems

Nearly one-fourth of all organizations have unauthorized modems connected to their network, providing easy network access for computer attackers that firewalls won't stop.

Coping with the Gramm-Leach-Bliley Act

We speak with one of the GLBA's five authors to discuss the challenges organizations face as they struggle to stay GLBA-compliant.

Alert: Virus Masquerades as Microsoft Security Update

New worm targets old IE vulnerability.