Security


Dispelling Log Data Retention Myths

Retaining data isn't enough. IT faces a host of regulations that address maintaining log files—tracking who did what and when—along with the requiring access to them in very short order.

Survey: CEOs Crave Better Perimeter and Access Controls

Not knowing who’s accessing what is a recipe for auditing disasters

Security Briefs: April Recap, Can-Spam Charges, Eset's Antivirus Software

Top vulnerabilities include a virus and a Hotmail hoax; FTC charges spammers; NOD32 antivirus software for consumers and the enterprise

Case Study: Mohegan Sun Bets on Virtual Password Vault

The Connecticut casino and entertainment center uses password management software, which acts as an intermediary with applications, to ensure passwords are available—and secure—around the clock.

Host Intrusion Prevention: A New Approach to Keeping Systems Safe

Host-based intrusion prevention runs as a software agent on a user's system, looking for unauthorized actions

Security White Papers

White papers examine self-defending networks, managing security events, Wi-Fi security, and unsolicited e-mail

Configuration Management Goes Mobile

New software fixes mobile computers that deviate from corporate standards



Cloaking Assets With Identity-Level Firewalls

New technology lets you hide and verify network identity inside the packets themselves.

American E-business Struggles with Global Fraud

Forty percent of U.S. credit card fraud traced to handful of criminals from just five foreign countries; risk of punishment not a deterrent

Security Briefs: Two Protocol Vulnerabilities Disclosed

TCP vulnerability exploit found in the wild; buffer overflow weakness uncovered in Microsoft PCT protocol

Q&A: Securing Mobile Workers

By 2006, over half the U.S. workforce will be mobile. Security managers face a daunting task.

Disabling Rogue WLAN Access

Detect, then actively block, unauthorized WLAN users

Five Signs Your Enterprise Needs Distributed Security

After years of merely reacting to new vulnerabilities, a centralized security model can no longer counter today's threats.

Worst Security Problem: Attachments

Security policies and education aren't enough

Case Study: Securing Mail Transactions in Any Form

Encrypting information and keys in hardware

Businesses Ignore Mobile PDA Threat

When it comes to mobile devices, why do so many companies avoid the security issues?

In Brief

Cisco sign-on, IE cross-scripting lead vulnerabilities this week

Security Briefs: Encrypted Attachments Carry Threats

Sneaking vulnerabilities into the enterprise through encrypted attachments pose new problems; ISPs will spend $245 million this year to combat problems, in large part because of home users.

Case Study: Stopping Leaks of Program Code

Using pattern matching with information taxonomy tools to track sensitive information leaving the company

Human Error Tops List of Vulnerabilities

Only half of respondents in a new survey say their company has a written security policy. Furthermore, despite the increases in threats, many organizations have been slow to make the appropriate investments in time and budget to properly address them.