Visa applicants left high and dry as government database hit with virus
Organizations regard the intersection of physical and electronic security—holistic security, if you will—as the end goal
Anti-virus vendors report MS patch does not protect against Trojan Qhosts; September's list of top ten viruses
Nearly one-fourth of all organizations have unauthorized modems connected to their network, providing easy network access for computer attackers that firewalls won't stop.
We speak with one of the GLBA's five authors to discuss the challenges organizations face as they struggle to stay GLBA-compliant.
New worm targets old IE vulnerability.
IDC predicts security and business continuity spending will increase twice as fast as overall IT budgets between now and 2007.
CERT’s Coordination Center outlines the top steps businesses, vendors, and the government can take to arrest the onerous cycle of constant patching.
From carrots to sticks, a variety of recent regulations has presented a challenge to security managers. We ask a security expert where U.S. and European regulations are headed.
Versions of OpenSSH prior to 3.7.1 are vulnerable to denial of service attacks via a buffer management problem. We explain the problem and what you can do about it.
Can information security professionals really get certified in half the ordinary time?
The dot-com boom’s legacy: buggy code. How do you find those bugs? Instead of trying to do code reviews with tools that were meant for developers, it's time to do them with tools meant for security
Yankee Group predicts large growth in the authentication market. Here are three things every organization needs to do to ensure users are who they say they are.
Handheld security expert suggests best practices for organizations that support the devices
Vulnerability in Microsoft applications occurs thanks to Visual Basic for Applications
Central Command shows a single virus accounted for over three-quarters of all activity last month.
Cisco details vulnerabilities in CiscoWorks; eMule code hiding in P2P software
Techniques for challenging and defeating spam filters continue to grow
To avoid the patch-and-pray cycle, IT organizations need to examine how to make vulnerabilities such as Sobig seem so small.
Microsoft releases a patch for IE 5.01 and above; company's Data Access Components could run hacker's code