A newcomer dominates this month's list
A new report from McAfee examines European companies' vulnerabilities.
Six modules in Computer Associates' new eTrust Identity and Access Management Suite, used in any combination, provide an integrated solution to managing identities, from provisioning to enforcement.
The company's VP of technology weighs in on integrating security able to scale rapidly and fail well.
Novell beta support pack fixes multiple “highly critical” vulnerabilities. We explain the problem and what you can do about it.
NetScreen survey also reports a widespread belief that current security set-ups are inadequate to defend against these threats
The data-swapping standard, now incorporated into Microsoft's Office 2003, may be the next big route for malicious attacks.
It's no longer enough just to use encryption. Now what's important is how well you've used encryption, how well you administer it, and how well you can prove to auditors what you're doing.
Buffer overflow attack could give the attacker administrative privileges
The problem: how to support an "always on" environment.
Network Associates launches comprehensive security package for Microsoft’s new SharePoint portal server and associated tools
Security consultant details ways to protect yourself
Yankee Group’s recommendations for getting the most from managed security outsourcing
Payload and speed make them especially dangerous; eight best practices for resisting their impact
Visa applicants left high and dry as government database hit with virus
Organizations regard the intersection of physical and electronic security—holistic security, if you will—as the end goal
Anti-virus vendors report MS patch does not protect against Trojan Qhosts; September's list of top ten viruses
Nearly one-fourth of all organizations have unauthorized modems connected to their network, providing easy network access for computer attackers that firewalls won't stop.
We speak with one of the GLBA's five authors to discuss the challenges organizations face as they struggle to stay GLBA-compliant.
New worm targets old IE vulnerability.