Security


Q&A: Single-System Message Management

It's not just a matter of blocking unsolicited e-mail. Today's security professionals need to protect against outbound as well as inbound problems.

Security Managers Report Virus Problem Worse

New report charts security manager dissatisfaction

F-Secure Targets Attacks on Linux

As popularity of Linux grows, company predicts increasing attempts to create malicious programs that will attack it

Combating Apathy with Free Security Check

WholeSecurity gives businesses the ability to offer their customers an opt-in PC security sweep to quarantine malicious software

Briefs: Vulnerabilities in CPanel, ISS products, Symantec Internet Security

New warnings about Web hosting control panel protection, ISS server-response processing, and Symantec's security software

Best Practices: New Standard Helps Companies Prove Their World-Class Security

Interest is growing in a new British Standard—BS7799—that is slowly being adopted outside of Britain; companies adopting the standard may find they've implemented a best-practices security program.

E-business Profits: Gone with the Criminal?

Viruses are not the only reason why interest in e-business is declining. Hackers and fraudsters are also to blame.



ASN Security Issues Run Deep, Forrester Warns

Security flaws reveal weaknesses in Microsoft's Abstract Syntax Notation One, a cryptographic and authentication mechanism in use by every Window operating system. The problem is with the compiler, not the applications themselves. It's time for developers to patch and recompile quickly.

Case Study: Securing Systems You Don't Directly Control

The University of Colorado Hospital struggled to keep its network secure to comply with HIPAA regulations, made difficult because IT didn't have direct control over some connected systems.

New Breed of Attack Targets Microsoft Outlook XP Users

Microsoft upgrades Outlook XP's vulnerability to "critical" after researcher finds additional flaws; company urges patch be applied quickly

February Sets Virus Record

Kaspersky Labs' Top Twenty list of vulnerabilities reveals e-mail viruses were never more plentiful.

Case Study: Protecting Intellectual Property on the Go

Kettering Medical Center finds a solution to who sees the data, for how long, and how much data a user can view.

Worm Writers One-Up Each Other

The battle to capture your e-mail address has gone to new levels: deleting competing worms.

Touching SAP Data: User Access and Biometrics

Enterprises can record when users access data in an SAP system, but biometrics makes it possible to add physical evidence to the log.

Compartmentalize Your Network to Improve Security

An often-overlooked layer of defense can provide last-ditch protection against malicious software threats.

Alerts

New Vulnerabilities Steal Financial Data Via ICQ, Target P2P File Traders, and Delete Office Files

Q&A: Managing Security Through Enterprise Procurement

Simplifying the time-consuming process of setting up security, and changing security permissions quickly, can often be handled through procurement software.

Case Study: Meeting Customer Demand for Secure Statements

Rather than navigating a Web site to see their data, customers at New York Life Investment Management Retirement Services enter only a username and password to see statements in an HTML e-mail attachment.

Microsoft Says Security Improvements Coming

The company is querying its user base for security enhancements; meanwhile, security option defaults will be changed in future releases and updates.

Briefs

E-mail fraud and vulnerabilities, plus the impact of Microsoft's source code leak