Security


In Brief

Banks help ID thieves; unified security appliances; server security

In Brief

Symantec grabs @Stake; JPEG vulnerabilities; Mozilla holes; Sniffer worm

Best Practices: IM Monitoring

Under pressure from such regulations as HIPAA, the Gramm-Leach-Bliley Act, and Sarbanes-Oxley, companies increasingly have to account for their corporate instant messaging policies. Yet many organizations don’t have rules for IM use.

Case Study: Outsourcing Network Management and Security

How one company found an outsourcer able to manage its network equipment and offer cogent security advice

Case Study: Law Firm Isolates Potential Threats

Office uses one-stop monitoring for attacks and vulnerabilities

In Brief

New security legislation; the future of e-mail and IM security

Inside Attackers Often Unremarkable, Warns CERT

Most attacks are relatively unsophisticated, planned in advance, conducted during normal business hours, and start from inside the organization. The common driver comes as no surprise: money.



Yankee Group Says Security Outsourcing Set to Explode

Managed security service providers to dominate security market by 2010

In Brief

Most unsolicited e-mail originates in U.S., survey finds; securing storage; name-dropping attacks

Digital Certificates Get Pentagon, Regulatory Boost

Once they seemed doomed, but public key infrastructure is taking off, driven by e-commerce servers, Pentagon requirements, and government regulations.

Five Steps to Enforcing Your Endpoint Security

Your security policy has to have teeth. Here's how to enforce your endpoint security policy.

Security Briefs

Sun Solaris/Apache, Netscape/Sun, Winamp Vulnerabilities

Passing the WLAN Security Buck

Company offers outsourced wireless LAN to overcome security vulnerabilities

Briefs

More XP SP2 woes, fraud awareness survey, Can-Spam's failure

CA Jumps into Anti-Spyware Market

Acquisition of PestPatrol signals single-console management of viruses, spam, and spyware may not be far away.

Top Six Settings in Windows Security Templates

Understanding what the security templates can provide could be invaluable.

New Technology Combats Zero-Day Attacks

Exploits expected to get worse, putting even more pressure on security managers

In Brief

Delaying XP Upgrades, AOL IM Buffer Overflow, Virus Source