Security


In Brief

Blame unusable security, not users; Apple worm; high-speed IPS

Bias-Free Security Testing

New security-risk management tools bridge the security/business gap

Missing from SOX Compliance Efforts: IM Audits, Archives

With the November 15 deadline looming for many organizations, many companies still don’t have a plan for auditing and archiving instant messages.

In Brief

Antivirus and browser vulnerabilities, unsubscribe may be unwise

Google Desktop Search Tool Raises Security Concerns

Free hard-drive indexing utility raises corporate security and privacy questions

Ten Best Practices to Secure Web Services

As more organizations embrace Web services (which opens back-office processes to partners and the Internet), a problem is emerging: who inside the organization is in charge of Web services security?

Thwarting Next-Generation Denial-of-Service Attacks

Domain name registrar copes with DoS spike



In Brief

Top 20 Windows/Unix vulnerabilities, Microsoft flaws and fixes

Q&A: Using Business Rules to Tackle Vulnerabilities

Identifying business assets to aid threat mitigation

Auditing Security Baselines with Security Templates

There are two primary methods for auditing computers with security templates: manually and using a script command. We explain the benefits and drawbacks of each.

Case Study: Credit Union Encrypts Data onto Secure USB Keys

How one financial company distributes secure information to its board of directors, many of whom work in an insecure environment

In Brief

Human error and security; AOL's two-factor authentication; September viruses

Understanding the New Breed of Hackers

Knowing how today's hackers think and work is the first step to combating their attacks.

Endpoint Security Grows But Interoperability Questions Remain

Increasingly, PCs must prove they're secure before a user can log onto the network

Using Windows Security Templates for Baselines

Creating a baseline of security for servers and clients is essential for a secure environment.

Software Vaults Protect Sensitive Information

Software vaults are increasingly the solution for securing passwords, notes from the board of directors, and more

Best Practices: Security Budgeting for 2005

IT must cope with under-funded regulations, more CIO leeway

In Brief

RealPlayer and JPEG vulnerabilities; security insurance

Patch or Perish: Symantec Notes Dramatic Increase in Threats

Symantec's assessment of system vulnerabilities in the first half of this year shows a dramatic increase in the number and potential destruction of security threats.

Smart Cards Gear Up For Biometrics

Smart cards, currently a favorite of governments and large corporations, are getting more powerful, incorporating Java and USB technologies.