Cape Cod Cooperative Bank chooses a dedicated appliance to can its network for vulnerabilities
Mobile phones, lack of policies expose the enterprise
Communication and monitoring are key, but policies must evolve with changing regulations and new technologies
Automating E-Mail Retention, Industry Forms VoIP Security Alliance
Survey shows security managers still face budget battle
CSOs concerned by malware and regulations; top IM security predictions; Eudora vulnerability
HIPAA mandates penalties for data disclosure. Here's how a hospital went about finding an intrusion detection solution.
When it comes to information security, does the U.S. Department of Homeland Security have a blind spot?
What's in store for information security
Charting spyware growth, identity theft at universities, safer Web browsing
Microsoft, Solaris vulnerabilities; top spyware threats; IPS use rising
With the November 15 deadline looming for many organizations, many companies still don’t have a plan for auditing and archiving instant messages.
Software vaults are increasingly the solution for securing passwords, notes from the board of directors, and more
IT must cope with under-funded regulations, more CIO leeway
Under pressure from such regulations as HIPAA, the Gramm-Leach-Bliley Act, and Sarbanes-Oxley, companies increasingly have to account for their corporate instant messaging policies. Yet many organizations don’t have rules for IM use.
Most unsolicited e-mail originates in U.S., survey finds; securing storage; name-dropping attacks
Once they seemed doomed, but public key infrastructure is taking off, driven by e-commerce servers, Pentagon requirements, and government regulations.
Your security policy has to have teeth. Here's how to enforce your endpoint security policy.
More XP SP2 woes, fraud awareness survey, Can-Spam's failure
Public key infrastructure isn't dead yet.