Banks help ID thieves; unified security appliances; server security
Symantec grabs @Stake; JPEG vulnerabilities; Mozilla holes; Sniffer worm
Under pressure from such regulations as HIPAA, the Gramm-Leach-Bliley Act, and Sarbanes-Oxley, companies increasingly have to account for their corporate instant messaging policies. Yet many organizations don’t have rules for IM use.
How one company found an outsourcer able to manage its network equipment and offer cogent security advice
Office uses one-stop monitoring for attacks and vulnerabilities
New security legislation; the future of e-mail and IM security
Most attacks are relatively unsophisticated, planned in advance, conducted during normal business hours, and start from inside the organization. The common driver comes as no surprise: money.
Managed security service providers to dominate security market by 2010
Most unsolicited e-mail originates in U.S., survey finds; securing storage; name-dropping attacks
Once they seemed doomed, but public key infrastructure is taking off, driven by e-commerce servers, Pentagon requirements, and government regulations.
Your security policy has to have teeth. Here's how to enforce your endpoint security policy.
Aeroplan adopts an XML firewall
Sun Solaris/Apache, Netscape/Sun, Winamp Vulnerabilities
Company offers outsourced wireless LAN to overcome security vulnerabilities
More XP SP2 woes, fraud awareness survey, Can-Spam's failure
Acquisition of PestPatrol signals single-console management of viruses, spam, and spyware may not be far away.
Understanding what the security templates can provide could be invaluable.
Exploits expected to get worse, putting even more pressure on security managers
Delaying XP Upgrades, AOL IM Buffer Overflow, Virus Source