-
Understanding the three domain functional levels of Windows Active Directory is key to taking advantage of its advanced features
-
A new report examines IPS products in rigid performance, security, and usability tests.
-
The Department of Defense adopts new certification verification processes
-
Experts say Microsoft could be leading the charge for antivirus and anti-spyware software that runs from a single interface
-
Keeping hard drive data encrypted is more important than ever
-
Web-application firewalls protect against unknown attacks
-
Software can establish a baseline of "normal" application activity, then sound the alarm when an app behaves erratically
-
The security solution you choose has important implications for your company and your career.
-
CSOs concerned by malware and regulations; top IM security predictions; Eudora vulnerability
-
Manufacturers' inability to patch their computers against every newly discovered virus and worm leaves their systems highly exposed
-
Two trends are driving the growth of digital signatures for sign-off and revisions of digital documents
-
Security hiring growth slow but steady; end-users blame ISPs and product vendors for spam
-
With more-secure browser alternatives now available, will IE go by the boards?
-
Many organizations skimp on maintaining health data centers, putting security at risk
-
Group Policy settings control almost every aspect of a computer from a central location, but incorrect settings can cause serious problems for clients and servers within the domain. We explain how to avoid problems from these error-prone settings.
-
2005 security growth areas, tricking code to reveal its flaws, and a mobile-phone virus gets legs
-
Automated bots crawl Internet for spyware, and the NSA talks about securing Mac OS X installations
-
How to safeguard an educational network when its users face few rules and resources don’t exist to police them closely
-
What's hot in security spending this year
-
Continuing Internet Explorer vulnerabilities; FTC sweep for GLBA compliance snares two companies
-
Vulnerability management is no longer about maintaining perfectly patched machines.
-
Some of Windows' settings affect domain controllers, where others affect all computers. To ensure that your security foundation is properly established, use Group Policy objects to deploy and configure your security settings.
-
HIPAA mandates penalties for data disclosure. Here's how a hospital went about finding an intrusion detection solution.
-
Problems with Adobe Acrobat, Microsoft .NET, and phpMyAdmin
-
When it comes to information security, does the U.S. Department of Homeland Security have a blind spot?