It's not just a matter of blocking unsolicited e-mail. Today's security professionals need to protect against outbound as well as inbound problems.
New report charts security manager dissatisfaction
As popularity of Linux grows, company predicts increasing attempts to create malicious programs that will attack it
WholeSecurity gives businesses the ability to offer their customers an opt-in PC security sweep to quarantine malicious software
New warnings about Web hosting control panel protection, ISS server-response processing, and Symantec's security software
Interest is growing in a new British Standard—BS7799—that is slowly being adopted outside of Britain; companies adopting the standard may find they've implemented a best-practices security program.
Viruses are not the only reason why interest in e-business is declining. Hackers and fraudsters are also to blame.
Security flaws reveal weaknesses in Microsoft's Abstract Syntax Notation One, a cryptographic and authentication mechanism in use by every Window operating system. The problem is with the compiler, not the applications themselves. It's time for developers to patch and recompile quickly.
The University of Colorado Hospital struggled to keep its network secure to comply with HIPAA regulations, made difficult because IT didn't have direct control over some connected systems.
Microsoft upgrades Outlook XP's vulnerability to "critical" after researcher finds additional flaws; company urges patch be applied quickly
Kaspersky Labs' Top Twenty list of vulnerabilities reveals e-mail viruses were never more plentiful.
Kettering Medical Center finds a solution to who sees the data, for how long, and how much data a user can view.
The battle to capture your e-mail address has gone to new levels: deleting competing worms.
Enterprises can record when users access data in an SAP system, but biometrics makes it possible to add physical evidence to the log.
An often-overlooked layer of defense can provide last-ditch protection against malicious software threats.
New Vulnerabilities Steal Financial Data Via ICQ, Target P2P File Traders, and Delete Office Files
Simplifying the time-consuming process of setting up security, and changing security permissions quickly, can often be handled through procurement software.
Rather than navigating a Web site to see their data, customers at New York Life Investment Management Retirement Services enter only a username and password to see statements in an HTML e-mail attachment.
The company is querying its user base for security enhancements; meanwhile, security option defaults will be changed in future releases and updates.
E-mail fraud and vulnerabilities, plus the impact of Microsoft's source code leak