Resistance, then acceptance of automated e-mail retention; reports of spam’s decline premature
Anti-spyware fallout, CTOs urge online crime taskforce, Microsoft specs IE7, mobile phone virus arrives in U.S.
Chances are your VPN is vulnerable
Microsoft, Solaris vulnerabilities; top spyware threats; IPS use rising
Denial is not a legitimate wireless strategy
Highly critical IE vulnerability lacks patch; new attacks reanimate mobile AV
Increasingly, PCs must prove they're secure before a user can log onto the network
Your security policy has to have teeth. Here's how to enforce your endpoint security policy.
Company offers outsourced wireless LAN to overcome security vulnerabilities
New study says 80 percent of companies have at least some unsecured wireless traffic
DoS attacks possible on 802.11 devices, public access points particularly vulnerable; tricking Outlook 2003 to download and run files
New software fixes mobile computers that deviate from corporate standards
Detect, then actively block, unauthorized WLAN users
When it comes to mobile devices, why do so many companies avoid the security issues?
Securing common, Internet-connected, mobile devices requires a new approach. Schindler Elevator Corp. found one.
The wireless debate has moved from demonstrating that wireless is a viable technology to solving the associated management issues. New software and upgrades may hold the answer.