-
Regulations are leading organizations toward automated database intrusion prevention, auditing, and encryption
-
Automated vulnerability remediation exists, but most companies still take a manual approach
-
What auditors and database administrators need to know
-
Executives Decry Cost of SOX, IM Security Still a Concern, and a Mobile Phone Worm Evolves
-
What CFOs and CIOs need to know
-
Security managers have boosted antivirus and firewall protection, but enterprises may need to switch gears as new regulations target how enterprises handle personally identifying data
-
Symantec Antivirus Vulnerability; New Identity Management Acquisitions; NIST Releases HIPAA Security Guide
-
Performance takes biggest hit from spyware today; look out for spyware working as a phishing aid
-
If your phone is so smart, why is it an enterprise security risk?
-
Free Stuff a Security Risk; New Firefox Flaws Surface
-
Cape Cod Cooperative Bank chooses a dedicated appliance to can its network for vulnerabilities
-
Mobile phones, lack of policies expose the enterprise
-
What happens when an organization with spyware problems can’t install anti-spyware software on every system?
-
Criminal intentions behind half of all attacks; mass-mailing worms on the outs
-
Forrester pushes personal firewalls, virus writers join forces, Windows rootkits circulate, Symantec sees kid sites awash in adware
-
Many CSOs still have difficulty communicating security requirements to their more business-oriented peers.
-
How can IT managers secure endpoints over which they have no control?
-
Communication and monitoring are key, but policies must evolve with changing regulations and new technologies
-
Identity theft draws media attention; phishing attacks skyrocket
-
Automating E-Mail Retention, Industry Forms VoIP Security Alliance
-
Don't forget to secure your VoIP network
-
Resistance, then acceptance of automated e-mail retention; reports of spam’s decline premature
-
Survey shows security managers still face budget battle
-
Anti-spyware fallout, CTOs urge online crime taskforce, Microsoft specs IE7, mobile phone virus arrives in U.S.
-
Chances are your VPN is vulnerable