Security


Locking Down Laptops

Keeping hard drive data encrypted is more important than ever

Scale is Everything for Pentagon’s Digital Security

The Department of Defense adopts new certification verification processes

Case Study: Virtual Patches Defend Web Applications

Web-application firewalls protect against unknown attacks

Q&A: Preventing “Applications Gone Wild”

Software can establish a baseline of "normal" application activity, then sound the alarm when an app behaves erratically

Careers: Are You a Security Conservative, Gloryhound, or Gambler?

The security solution you choose has important implications for your company and your career.

In Brief

CSOs concerned by malware and regulations; top IM security predictions; Eudora vulnerability

Control Systems Leave Manufacturers Vulnerable

Manufacturers' inability to patch their computers against every newly discovered virus and worm leaves their systems highly exposed



Putting Next-Generation Smart Cards to Work

Two trends are driving the growth of digital signatures for sign-off and revisions of digital documents

In Brief

Security hiring growth slow but steady; end-users blame ISPs and product vendors for spam

Defection to More-Secure Browsers? Don't Bet On It

With more-secure browser alternatives now available, will IE go by the boards?

Top 10 Data Center Dangers

Many organizations skimp on maintaining health data centers, putting security at risk

Top 5 GPO Trouble-Causing Settings

Group Policy settings control almost every aspect of a computer from a central location, but incorrect settings can cause serious problems for clients and servers within the domain. We explain how to avoid problems from these error-prone settings.

In Brief

2005 security growth areas, tricking code to reveal its flaws, and a mobile-phone virus gets legs

Case Study: Adopting Inverted Firewalls

How to safeguard an educational network when its users face few rules and resources don’t exist to police them closely

In Brief

Automated bots crawl Internet for spyware, and the NSA talks about securing Mac OS X installations

Security Spending Trends for 2005

What's hot in security spending this year

In Brief

Continuing Internet Explorer vulnerabilities; FTC sweep for GLBA compliance snares two companies

Q&A: Open Source Network Vulnerability Scanners

Vulnerability management is no longer about maintaining perfectly patched machines.

Ten Group Policy Settings To Ensure Consistent Windows Security

Some of Windows' settings affect domain controllers, where others affect all computers. To ensure that your security foundation is properly established, use Group Policy objects to deploy and configure your security settings.

Case Study: Protecting Hospitals’ Increasingly Networked Systems

HIPAA mandates penalties for data disclosure. Here's how a hospital went about finding an intrusion detection solution.