Security


Best Practices in Security Training

Worms and legislation dictate the need for security-savvy employees; here's how to train them and reinforce human nature.

Sobig Lives Up to Its Name

It's been a banner month for viruses, as new vulnerabilities were unleashed and others lingered

Worm Continues Blast Across Internet

Worm exploits RPC/DOM vulnerability; denial-of-service attacks still likely

Passwords and Identity: Seeking Synergy

Do password management software and identity synchronization software naturally go together? One thing's for sure: the ROI for both categories is attractive.

Alerts: BSD and Postfix Vulnerabilities; File-Sharing Dangers

New vulnerabilities in BSD operating system and Postfix, a popular mail transfer agent; the FTC warns about the dangers of file-sharing

Case in Point: Protecting the Network Edge

Japanese university finds easy way to control network access

Alerts: Vulnerabilities in IE, Windows Desktops

MiMail.A exploits IE flaw; Autorooter targets windows hole to run its own code



How To Protect Yourself from Fibre Channel Insecurity

Vendor and end-user ignorance perpetuate security holes, security architect warns

Boosting IM Security

Management key to enterprise rollout; financial services advised to retain messages

Identity Management: Untangling Meta and Virtual Directories

We discuss how organizations use virtual directories to interface enterprise applications and identity data with Clayton Donley, CEO of OctetString, a virtual directory provider.

Briefs: RPC/DCOM Vulnerability, Budgets Impact Regulatory Compliance

Microsoft offers patch to a critical Windows problem; survey shows few companies are in regulatory compliance

Integrating Security into Software Development

AppScan Developer Edition provides fully automated application security testing for major development environments

The Perils of Identity Mismanagement

eProvision Role-Out normalizes, reconciles, and cleans user identities

Teaming Identity Management with Auditing

Novell's Nsure Audit helps you comply with government regulations, organizational policies

California Privacy Law: Goodbye Good Intentions

New law mandates information theft disclosure no matter what

Briefs: Brand spoofing on the rise; e-Security update

SurfControl reports brand spoofing is on the rise; e-Security updates Enterprise Security Management software

Wireless LAN Monitoring Reveals Risks and Risky Behavior

An activity-monitoring experiment in a confined, high-usage WLAN environment shows surprisingly few users take security precautions when accessing e-mail.

Briefs: Microsoft Flaw, nCircle Update

Microsoft warns of critical security flaw, nCircle updates IP360 vulnerability management

CA, SteelCloud Enter Crowded Appliance Market

Companies announce launch of antivirus, IDS boxes

Unsolicited E-mail Tops List of Intrusions

Spam edges out viruses; legal threat rises