What CFOs and CIOs need to know
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Security managers have boosted antivirus and firewall protection, but enterprises may need to switch gears as new regulations target how enterprises handle personally identifying data
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Symantec Antivirus Vulnerability; New Identity Management Acquisitions; NIST Releases HIPAA Security Guide
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Performance takes biggest hit from spyware today; look out for spyware working as a phishing aid
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    If your phone is so smart, why is it an enterprise security risk? 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Free Stuff a Security Risk; New Firefox Flaws Surface
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Cape Cod Cooperative Bank chooses a dedicated appliance to can its network for vulnerabilities
                    
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    Mobile phones, lack of policies expose the enterprise
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    What happens when an organization with spyware problems can’t install anti-spyware software on every system?
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Criminal intentions behind half of all attacks; mass-mailing worms on the outs
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Forrester pushes personal firewalls, virus writers join forces, Windows rootkits circulate, Symantec sees kid sites awash in adware
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Many CSOs still have difficulty communicating security requirements to their more business-oriented peers.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    How can IT managers secure endpoints over which they have no control?
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Communication and monitoring are key, but policies must evolve with changing regulations and new technologies 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Identity theft draws media attention; phishing attacks skyrocket
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Automating E-Mail Retention, Industry Forms VoIP Security Alliance
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Don't forget to secure your VoIP network
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Resistance, then acceptance of automated e-mail retention; reports of spam’s decline premature
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Survey shows security managers still face budget battle
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Anti-spyware fallout, CTOs urge online crime taskforce, Microsoft specs IE7, mobile phone virus arrives in U.S.