Forty percent of U.S. credit card fraud traced to handful of criminals from just five foreign countries; risk of punishment not a deterrent
After years of merely reacting to new vulnerabilities, a centralized security model can no longer counter today's threats.
Only half of respondents in a new survey say their company has a written security policy. Furthermore, despite the increases in threats, many organizations have been slow to make the appropriate investments in time and budget to properly address them.
It's not just a matter of blocking unsolicited e-mail. Today's security professionals need to protect against outbound as well as inbound problems.
New report charts security manager dissatisfaction
WholeSecurity gives businesses the ability to offer their customers an opt-in PC security sweep to quarantine malicious software
Viruses are not the only reason why interest in e-business is declining. Hackers and fraudsters are also to blame.
An often-overlooked layer of defense can provide last-ditch protection against malicious software threats.
Simplifying the time-consuming process of setting up security, and changing security permissions quickly, can often be handled through procurement software.
Auditing can do more than just help you meet a host of new government regulations. The author outlines the significant business benefits from a solid data-auditing program and explains the basic requirements of such a solution. (Part one of a two-part series.)
Companies turn to managed Service providers for help; desktops dominate security budgets as patches average $234 per machine.
Best practices in keeping the desktop secure
Encrypting, monitoring, and auditing access to actual data
Proponents say IM can function as XML message brokers between systems at a fraction of the cost of traditional messaging middleware; putting an IM interface on a back-end application can bring big benefits.
Coding errors in Web Services code at your partners can trigger problems on your own systems.
Gathering information in a legal, court-friendly way is vital if computer forensic evidence is to hold up in court.