-
By
From centralization to support for standards, these encryption key management and data security best practices can help you protect your organization’s confidential data and comply with regulatory mandates.
-
By
Firewalls and other technologies no longer adequately protect application code.
-
Firefox 3.0 release highlights the perils of information technology celebrity
-
By
What training do developers need and how do you get executive buy-in?
-
A security researcher announces a new Threat Forecast service that aims to keep security chiefs at least one step ahead of the bad guys
-
By
How do you ensure that your encryption solutions effectively secure all your sensitive data?
-
By
With more than 100 million Web applications deployed in the world, perhaps fewer than 5 percent of are being tested for security vulnerabilities. We offer three simple steps to help you secure your Web applications.
-
Why the threat of theft-from-within is keeping enterprise CIOs up at night
-
When it comes to ensuring compliance with information security rules or best practices, a substantial minority of federal agencies still aren’t making the cut
-
Firms that extend credit to consumers and small businesses must comply by November 1
-
By
Risks, rewards, and best practices
-
It may not be long before businesses differentiate themselves on the basis of security
-
IM attacks are on the rise, in part because organizations are deploying unified communications platforms without first hardening them against attacks
-
By
Report, covering late 2007, found a 300 percent increase in Trojan bugs.
-
During the first three months of 2008, security researcher Sophos identified about 15,000 freshly infected Web pages every day
-
By
Enterprise resource planning (ERP) applications can automate business processes but do nothing to solve security problems. Identity management software, working in tandem with ERP, can help.
-
Microsoft isn't the only vendor issuing security "mea culpa"s lately. Oracle and Apple got into the action last week, too.
-
A bevy of vendors -- including most prominent services providers -- have announced new payment card industry-oriented services.
-
The Global Internet Security Threat Report shows that as networks are more strongly protected, attackers have shifted tactics and targets.
-
Industry watchers speculate that the third service pack for Windows XP -- complete with security-related features -- could appear soon
-
New IT consumers are more comfortable with, and knowledgeable about, technology, and that’s a problem
-
By
Over 1,800 known cases of fraud result from data breach
-
The Web 2.0 paradigm shift is fraught with both promise and danger
-
By
Microsoft’s Trustworthy Academic Advisory Board has been keeping tabs on security issues -- external as well as internal -- that continue to challenge Microsoft’s developers. We take a look at the board, which is now five years old.
-
Sleeping laptops may be the next way hackers steal encrypted information