-
To counter security threats, developers can reverse-engineer their products, or take a less expensive and more effective approach
-
Microsoft details five critical vulnerabilities, including flaw that could be automatically exploited by a malicious Web page or e-mail
-
Organizations can derive the benefits of endpoint-security standards without the standards
-
Automated backups for compliance are essential in regulated industries, yet sometimes users need to make their own sets of compliance-related e-mails. Enter drag-and-drop archiving.
-
Know of a harmful vulnerability that hasn’t gone public? A new program wants to hear about it.
-
It's difficult to audit administrative passwords if you're not managing them properly. That's what drove Manitoba Lotteries Corp. to employ a password vault.
-
The latest Computer Crime and Security Survey shows cybercrime incidents and the cost of security breaches are decreasing, but Web site attacks and thefts of sensitive information are rising quickly.
-
An end user with two real-time anti-spyware engines asks if too much anti-spyware software is a bad thing
-
It's tough to determine an ROI for security investments. Looking at cost avoidance may be the way to go.
-
Microsoft patches two buffer overflow vulnerabilities, Apple patches OS X 10.4
-
How can organizations better contain virus outbreaks and defend against destructive or mass-mailing worms?
-
Automated worms and malware-born invaders are still wreaking havoc in the enterprise, and financial losses from cyber-criminals are increasing.
-
Too often, Microsoft’s Active Directory and its Group Policy Objects don't offer the granularity security administrators need.
-
A financial firm faces regulations for monitoring and retaining IM communications.
-
More organizations are using fingerprints for logging onto PCs and into sensitive applications.
-
Identity management software adoption is increasing, but many organizations still rely upon too many group permissions to effectively manage their implementations.
-
Targeted Trojan Attacks Increase, Security Zaps Productivity, Spyware Distributor Settles
-
CSOs worry about infected or unknown PCs logging onto their networks, but only one-third of companies are doing something about it
-
Reducing computing systems’ exposure to attack may be the goal, but unhooking network connections—or “denetworking”—is rarely feasible. A network endpoint appliance may be the answer.
-
Beware Standalone Patch Products, Banks Adopt More Security, Improving Can-Spam
-
Focus on social networking, ongoing analysis of today’s most-needed information security skills, and a diverse training regimen.
-
Analyzing esoteric attacks highlights where security can succeed and how secure devices can fail in unforeseen ways.
-
Bluetooth Attack Compromises PINs, New Smart Phone Malware, Charting the E-mail Security Market
-
Architecting fine-grained access to Web Services for many users at multiple organizations is difficult to implement or audit using identity management software. We discuss alternatives.
-
How organizations can get (and stay) compliant while spending less