Security


In Brief

Continuing Internet Explorer vulnerabilities; FTC sweep for GLBA compliance snares two companies

Ten Group Policy Settings To Ensure Consistent Windows Security

Some of Windows' settings affect domain controllers, where others affect all computers. To ensure that your security foundation is properly established, use Group Policy objects to deploy and configure your security settings.

Case Study: Protecting Hospitals’ Increasingly Networked Systems

HIPAA mandates penalties for data disclosure. Here's how a hospital went about finding an intrusion detection solution.

Q&A: Open Source Network Vulnerability Scanners

Vulnerability management is no longer about maintaining perfectly patched machines.

In Brief

Problems with Adobe Acrobat, Microsoft .NET, and phpMyAdmin

Critics Blast Cybersecurity at Department of Homeland Security

When it comes to information security, does the U.S. Department of Homeland Security have a blind spot?

Untangling Endpoint Security Initiatives

Two Endpoint security initiatives are underway—one from Cisco, the other from Microsoft. We take a closer look at these plus the evolution of endpoint security.



HP Throttles Viruses, Cracks OpenView Identity

The latest security announcements from Hewlett-Packard

Ensuring Group Policy Security Settings Are Consistent

Security settings deployed with Group Policy are highly efficient but not guaranteed by default. With a few extra steps you can guarantee that these security settings apply persistently to computers.

Top Ten Security Trends for 2005

What's in store for information security

In Brief

Charting spyware growth, identity theft at universities, safer Web browsing

Case Study: Outsourced Network Security Uses Behavioral Modeling

The Yankee Group predicts that by 2010, 90 percent of all security will be outsourced. Here's how one company made its decision to choose a pro-active security solution.

New Enterprise Tools Attack Spyware

Spyware is a moving target. Pushing out one level of filters just doesn’t cut it any more.

In Brief

Microsoft, Solaris vulnerabilities; top spyware threats; IPS use rising

Case Study: Securing Network Bandwidth

A packet-shaping tool can help handle worm outbreaks.

In Brief

Database and Imsecure vulnerabilities, search software flaw enables sophisticated phishing attack

Q&A: Can Wireless Networks Be Secured?

Denial is not a legitimate wireless strategy

Case Study: Finding and Fixing Security-Related Code Defects

Finding code problems was the challenge; a service provider's analysis held the answer

In Brief

Microsoft ISA vulnerability may lead to phishing attacks, a new version of MyDoom targets the IFRAME vulnerability in IE, and survey finds bank clients willing to defect over banks’ lack of ID theft protections

Microsoft and IBM Hone Security Warning Systems

Better security updates in the offing