Most attacks are relatively unsophisticated, planned in advance, conducted during normal business hours, and start from inside the organization. The common driver comes as no surprise: money.
Managed security service providers to dominate security market by 2010
Your security policy has to have teeth. Here's how to enforce your endpoint security policy.
Aeroplan adopts an XML firewall
Company offers outsourced wireless LAN to overcome security vulnerabilities
More XP SP2 woes, fraud awareness survey, Can-Spam's failure
Acquisition of PestPatrol signals single-console management of viruses, spam, and spyware may not be far away.
Exploits expected to get worse, putting even more pressure on security managers
New technology in a user-friendly toolbar intercepts users from visiting such sites
This XP Service Pack should be called a Security Pack
Make sure you check these essential control points in any Windows network audit
Active X Allows File Loading; Defining Spyware
IT is reassessing how network administrators and security personnel can work together more effectively
Your greatest security risk may not come from outside attacks but from your own employees. Setting policies and procedures aren't enough to stop the problem, but new security event management technology can help.
Only distributed security can protect the borderless enterprise from today's threats.
Forty percent of U.S. credit card fraud traced to handful of criminals from just five foreign countries; risk of punishment not a deterrent
After years of merely reacting to new vulnerabilities, a centralized security model can no longer counter today's threats.
Only half of respondents in a new survey say their company has a written security policy. Furthermore, despite the increases in threats, many organizations have been slow to make the appropriate investments in time and budget to properly address them.
It's not just a matter of blocking unsolicited e-mail. Today's security professionals need to protect against outbound as well as inbound problems.
New report charts security manager dissatisfaction