Security


In Brief

Problems with Adobe Acrobat, Microsoft .NET, and phpMyAdmin

Critics Blast Cybersecurity at Department of Homeland Security

When it comes to information security, does the U.S. Department of Homeland Security have a blind spot?

Untangling Endpoint Security Initiatives

Two Endpoint security initiatives are underway—one from Cisco, the other from Microsoft. We take a closer look at these plus the evolution of endpoint security.

HP Throttles Viruses, Cracks OpenView Identity

The latest security announcements from Hewlett-Packard

Ensuring Group Policy Security Settings Are Consistent

Security settings deployed with Group Policy are highly efficient but not guaranteed by default. With a few extra steps you can guarantee that these security settings apply persistently to computers.

Top Ten Security Trends for 2005

What's in store for information security

In Brief

Charting spyware growth, identity theft at universities, safer Web browsing



New Enterprise Tools Attack Spyware

Spyware is a moving target. Pushing out one level of filters just doesn’t cut it any more.

Case Study: Outsourced Network Security Uses Behavioral Modeling

The Yankee Group predicts that by 2010, 90 percent of all security will be outsourced. Here's how one company made its decision to choose a pro-active security solution.

In Brief

Microsoft, Solaris vulnerabilities; top spyware threats; IPS use rising

Case Study: Securing Network Bandwidth

A packet-shaping tool can help handle worm outbreaks.

In Brief

Database and Imsecure vulnerabilities, search software flaw enables sophisticated phishing attack

Q&A: Can Wireless Networks Be Secured?

Denial is not a legitimate wireless strategy

Case Study: Finding and Fixing Security-Related Code Defects

Finding code problems was the challenge; a service provider's analysis held the answer

Microsoft and IBM Hone Security Warning Systems

Better security updates in the offing

In Brief

Microsoft ISA vulnerability may lead to phishing attacks, a new version of MyDoom targets the IFRAME vulnerability in IE, and survey finds bank clients willing to defect over banks’ lack of ID theft protections

In Brief

Highly critical IE vulnerability lacks patch; new attacks reanimate mobile AV

Does Open-Source Software Mean Better Security?

Setting the open-source security record straight

Best Practices: Patch Management

To more rapidly test patches and keep network configurations from drifting, keep a closer watch on every device’s configuration

Defending Against Weak Authentication Protocols and Passwords

Passwords protect user logon and resource access, but only if the underlying authentication protocols are secure. Here's how to overcome vulnerabilities of older protocols.