Identity management software adoption is increasing, but many organizations still rely upon too many group permissions to effectively manage their implementations.
Beware Standalone Patch Products, Banks Adopt More Security, Improving Can-Spam
Focus on social networking, ongoing analysis of today’s most-needed information security skills, and a diverse training regimen.
Bluetooth Attack Compromises PINs, New Smart Phone Malware, Charting the E-mail Security Market
CA Antivirus Vulnerabilities; AOL Patches New Netscape; Beware Phishing E-mails Bearing Keylogging Software; New Trojan Encrypts PCs
While operator errors get blamed for the majority of security incidents, organizations aren’t budgeting a fix.
Avoiding Time Warner’s Backup Mistakes; Learning from Loveletter; Tivoli Offers Security Index
A new report from CERT and the U.S. Secret Service shows how to begin preventing insider attacks.
Sometimes the drive for better security can also bring cost savings.
List helps prioritize vulnerability patching
Why use separate firewall, intrusion detection and prevention, gateway antivirus, and VPN products when one appliance can handle it all?
As the effectiveness of e-mail worms decreases, attackers turn to network-based worms.
A cybersecurity group works to improve security in the chemical industry.
Automated vulnerability remediation exists, but most companies still take a manual approach
Performance takes biggest hit from spyware today; look out for spyware working as a phishing aid
What happens when an organization with spyware problems can’t install anti-spyware software on every system?
Many CSOs still have difficulty communicating security requirements to their more business-oriented peers.
Communication and monitoring are key, but policies must evolve with changing regulations and new technologies
Survey shows security managers still face budget battle