Most attacks are relatively unsophisticated, planned in advance, conducted during normal business hours, and start from inside the organization. The common driver comes as no surprise: money.
Managed security service providers to dominate security market by 2010
Your security policy has to have teeth. Here's how to enforce your endpoint security policy.
Aeroplan adopts an XML firewall
Company offers outsourced wireless LAN to overcome security vulnerabilities
More XP SP2 woes, fraud awareness survey, Can-Spam's failure
Acquisition of PestPatrol signals single-console management of viruses, spam, and spyware may not be far away.
New technology in a user-friendly toolbar intercepts users from visiting such sites
Exploits expected to get worse, putting even more pressure on security managers
This XP Service Pack should be called a Security Pack
Make sure you check these essential control points in any Windows network audit
Active X Allows File Loading; Defining Spyware
IT is reassessing how network administrators and security personnel can work together more effectively
When evaluating security products for your enterprise, make sure you also evaluate the vendors themselves using these criteria.
Symantec's head of Managed Security Services offers his perspective on what you should look for when considering a move to outsourced security
To resist downtime and attacks, many organizations are turning to security event management software, which collects and analyzes information from a variety of devices, PCs, servers, and firewalls, giving security administrators a consolidated view of network security.
While most companies don’t face worms designed to turn computers against them, denial-of-service attacks remain a problem. How can organizations stress test their network against such attacks? We turned to Alan Newman of Spirent Communications, which manufacturers network stress-testing appliances and simulation software, for some ideas.
How can you know you haven't been connected to a look-alike server, and how does it know your device isn't infected with malware? New hardware specification models from the Trusted Computing Group may help.
Your greatest security risk may not come from outside attacks but from your own employees. Setting policies and procedures aren't enough to stop the problem, but new security event management technology can help.
Only distributed security can protect the borderless enterprise from today's threats.