Security


Case Study: Fielding Service Calls Securely

Securing common, Internet-connected, mobile devices requires a new approach. Schindler Elevator Corp. found one.

Effective Data Auditing for Regulatory Compliance: Options and Considerations

Auditing can do more than just help you meet a host of new regulations. Last week we outlined several significant business benefits. This week we explore your options. (Second in a two-part series.)

Alerts

Sarbanes-Oxley; partnering for security; security certification guide

Q&A: Real-Time Database Monitors May Ease Regulatory Headaches

Near-real-time monitoring may help your company catch attackers and restore altered data.

Security Briefs

Microsoft Warns of Critical ASN.1 Vulnerability; More Doom Unleashed

Ten Business Benefits of Effective Data Auditing

Auditing can do more than just help you meet a host of new government regulations. The author outlines the significant business benefits from a solid data-auditing program and explains the basic requirements of such a solution. (Part one of a two-part series.)

Top Three Security Problems Remain Despite Increased Spending

Companies turn to managed Service providers for help; desktops dominate security budgets as patches average $234 per machine.



MyDoom Details from Kaspersky Labs

Newest vulerabilities feed on old worm to take aim at Microsoft's Web site

Solving the Patch Management Headache

Best practices in keeping the desktop secure

Briefs

New Mydoom variants; Vulnerabilities in IE browser, Checkpoint products; January a banner month for threats.

Beyond Perimeter Defense: Securing Online Transactions

Encrypting, monitoring, and auditing access to actual data

Can-Spam, Laced with Loopholes, Creates Confusion

New legislation has failed to stem the tide of unsolicited e-mail, protecting e-mailers who follow the letter but not the spirit of the law.

Companies Defect as Anti-virus Software Struggles with Worms

The latest threats have companies reconsidering their anti-virus tools, wondering if AV is becoming irrelevant. Increasingly, companies are looking at application-level personal firewalls and all-in-one gateway hardware for PCs.

First Worm Outbreak of the Year Packs a Wallop

MyDoom monopolizes Internet via e-mail harvesting, P2P file sharing, back door

Guarding Against Your Partner's Web Services Flaws

Coding errors in Web Services code at your partners can trigger problems on your own systems.

Product Shootout: Intrusion Prevention

Third-party testing firm analyzes leading IDS products, encounters surprises.

Briefs

New worm and Trojan software unleashed; purported PayPal mail carries worm

Reducing Unsolicited E-Mail: Making Senders Pay

Microsoft's Penny Black solution may impose fees on those sending unsolicited e-mail, while a service from Vanquish adds economic penalties for such messages.

Best Practices: Collecting Computer Forensic Evidence

Gathering information in a legal, court-friendly way is vital if computer forensic evidence is to hold up in court.