Security


IDC Says Market for Security Appliances Growing Fast

Research shows hardware appliances are primary avenue for security software delivery

Security Expert Predicts End of Mass-Mailing Worms in 2003

Look for more sophisticated information attacks this year.

Securing Instant Messaging

Like it or not, instant messaging (IM) is one communication tool that's here to stay. Many users are ecstatic about IM: It's quicker than e-mail and less intrusive than the telephone. It's also riddled with security challenges.

IBM and VeriSign Release New Security Services

Managed solutions provide high-end protection at low cost for small- to medium-sized businesses.

Security Briefs

Patent Issue for Liberty Alliance; New Window Vulnerability Found; PDFs Threaten Unix, Linux; CipherShare Product Secures Windows Assets

Microsoft to Share Passport Source Code

Redmond hopes to increase enterprise use of its single sign-on solution.

Know Your Vulnerabilities

Is your security plan working? A study suggests that whatever your company is doing right now, it probably isn't enough.



Test Data: Security Loophole?

It's not always the threat of security breaches from the outside that needs your attention. Sometimes the problem comes from inside your company, and it isn't always intentional.

Getting in Front of Security

From networking intrusion to virus detection, the basic security paradigms really haven't changed much in the past.

Wireless Insecurity

Take one look at the tangle of cables connecting the computer to its monitor, peripherals and printers, and it’s not hard to imagine how someone thought "wireless." Sample the wireless 802.11b network (a.k.a. Wi-Fi and AirPort) in a café after crawling around on your hands and knees underneath your desk trying to find a live Ethernet port.

Securing Web Services

Web services—one of the latest waves in business and technology—is closer to reality now that we almost have an agreed-upon security framework: Security Assertions Markup Language (SAML). It may soon be possible for companies to use Web services securely.

Shell Game

Computer forensics involves knowing where to look for data when a criminal attempts to destroy evidence. Find out how and where to seek data that can lead to catching a criminal.

Defending the Faith

A hardened operating systems brings security to the Bahá‘í International Community's Web site.

The Homeland Security Imperative

Impending pressure from the FBI or Congress may force companies to share evidence of break-ins, or disclose the SEC level of information security preparedness. Is your company ready?

Defending the Faith

A hardened operating systems brings security to the Bahá‘í International Community's Web site.

Homeland Defense: Are We Walking the Talk?

What's really happened to the security of information technology since Sept. 11?

Unleash the Cyberhounds!

Once you've been attacked, it's far too late. A good diagnostics system, more commonly known as a forensic program, can provide that preparation.

Put a Good Security Staff in its Place

You've convinced top management, got the funding, and hired a crackerjack security staff. Congratulations! Now comes the really hard part. Having a good security staff won't mean a thing if those security pros aren't effectively integrated into your company, and if they can't develop solid lines of communication.

CA Updates PKI Product

Announced at RSA Conference

The Search for Good Security Staff

The good news: Administering stand-alone mainframe security is easy. The bad: Finding people skilled at securing a mainframe in a distributed environment is very hard.