Security


Taming Smart Phones

If your phone is so smart, why is it an enterprise security risk?

In Brief

Free Stuff a Security Risk; New Firefox Flaws Surface

Case Study: Bank Audits Vulnerabilities with Security Appliance

Cape Cod Cooperative Bank chooses a dedicated appliance to can its network for vulnerabilities

Lack of Messaging Controls = Regulatory Risk

Mobile phones, lack of policies expose the enterprise

Ignorance of Spyware in the Enterprise Still High

What happens when an organization with spyware problems can’t install anti-spyware software on every system?

In Brief

Criminal intentions behind half of all attacks; mass-mailing worms on the outs

In Brief

Forrester pushes personal firewalls, virus writers join forces, Windows rootkits circulate, Symantec sees kid sites awash in adware



Tips for CSOs: How to Discuss Security Issues with Executives

Many CSOs still have difficulty communicating security requirements to their more business-oriented peers.

Q&A: Endpoint Security for Unknown Devices

How can IT managers secure endpoints over which they have no control?

Q&A: Security Policy Best Practices

Communication and monitoring are key, but policies must evolve with changing regulations and new technologies

Social Engineering Bypasses Information Security Controls

Identity theft draws media attention; phishing attacks skyrocket

In Brief

Automating E-Mail Retention, Industry Forms VoIP Security Alliance

Best Practices in VoIP Security

Don't forget to secure your VoIP network

In Brief

Resistance, then acceptance of automated e-mail retention; reports of spam’s decline premature

Corporate Security Awareness Grows but Funding Lags

Survey shows security managers still face budget battle

In Brief

Anti-spyware fallout, CTOs urge online crime taskforce, Microsoft specs IE7, mobile phone virus arrives in U.S.

Unraveling Common VPN Flaws

Chances are your VPN is vulnerable

Understanding Mixed and Native Domain Functional Levels

Understanding the three domain functional levels of Windows Active Directory is key to taking advantage of its advanced features

Buyer Beware: Putting Intrusion Protection to the Test

A new report examines IPS products in rigid performance, security, and usability tests.

Microsoft Update Onslaught Targets Spyware, Viruses

Experts say Microsoft could be leading the charge for antivirus and anti-spyware software that runs from a single interface