Retaining data isn't enough. IT faces a host of regulations that address maintaining log files—tracking who did what and when—along with the requiring access to them in very short order.
Not knowing who’s accessing what is a recipe for auditing disasters
Top vulnerabilities include a virus and a Hotmail hoax; FTC charges spammers; NOD32 antivirus software for consumers and the enterprise
The Connecticut casino and entertainment center uses password management software, which acts as an intermediary with applications, to ensure passwords are available—and secure—around the clock.
Host-based intrusion prevention runs as a software agent on a user's system, looking for unauthorized actions
White papers examine self-defending networks, managing security events, Wi-Fi security, and unsolicited e-mail
New software fixes mobile computers that deviate from corporate standards
New technology lets you hide and verify network identity inside the packets themselves.
Forty percent of U.S. credit card fraud traced to handful of criminals from just five foreign countries; risk of punishment not a deterrent
TCP vulnerability exploit found in the wild; buffer overflow weakness uncovered in Microsoft PCT protocol
By 2006, over half the U.S. workforce will be mobile. Security managers face a daunting task.
Detect, then actively block, unauthorized WLAN users
After years of merely reacting to new vulnerabilities, a centralized security model can no longer counter today's threats.
Security policies and education aren't enough
Encrypting information and keys in hardware
When it comes to mobile devices, why do so many companies avoid the security issues?
Cisco sign-on, IE cross-scripting lead vulnerabilities this week
Sneaking vulnerabilities into the enterprise through encrypted attachments pose new problems; ISPs will spend $245 million this year to combat problems, in large part because of home users.
Using pattern matching with information taxonomy tools to track sensitive information leaving the company
Only half of respondents in a new survey say their company has a written security policy. Furthermore, despite the increases in threats, many organizations have been slow to make the appropriate investments in time and budget to properly address them.