Blame unusable security, not users; Apple worm; high-speed IPS
New security-risk management tools bridge the security/business gap
With the November 15 deadline looming for many organizations, many companies still don’t have a plan for auditing and archiving instant messages.
Antivirus and browser vulnerabilities, unsubscribe may be unwise
Free hard-drive indexing utility raises corporate security and privacy questions
As more organizations embrace Web services (which opens back-office processes to partners and the Internet), a problem is emerging: who inside the organization is in charge of Web services security?
Domain name registrar copes with DoS spike
Top 20 Windows/Unix vulnerabilities, Microsoft flaws and fixes
Identifying business assets to aid threat mitigation
There are two primary methods for auditing computers with security templates: manually and using a script command. We explain the benefits and drawbacks of each.
How one financial company distributes secure information to its board of directors, many of whom work in an insecure environment
Human error and security; AOL's two-factor authentication; September viruses
Knowing how today's hackers think and work is the first step to combating their attacks.
Increasingly, PCs must prove they're secure before a user can log onto the network
Creating a baseline of security for servers and clients is essential for a secure environment.
Software vaults are increasingly the solution for securing passwords, notes from the board of directors, and more
IT must cope with under-funded regulations, more CIO leeway
RealPlayer and JPEG vulnerabilities; security insurance
Symantec's assessment of system vulnerabilities in the first half of this year shows a dramatic increase in the number and potential destruction of security threats.
Smart cards, currently a favorite of governments and large corporations, are getting more powerful, incorporating Java and USB technologies.