-
Two Endpoint security initiatives are underway—one from Cisco, the other from Microsoft. We take a closer look at these plus the evolution of endpoint security.
-
The latest security announcements from Hewlett-Packard
-
Security settings deployed with Group Policy are highly efficient but not guaranteed by default. With a few extra steps you can guarantee that these security settings apply persistently to computers.
-
What's in store for information security
-
Charting spyware growth, identity theft at universities, safer Web browsing
-
The Yankee Group predicts that by 2010, 90 percent of all security will be outsourced. Here's how one company made its decision to choose a pro-active security solution.
-
Spyware is a moving target. Pushing out one level of filters just doesn’t cut it any more.
-
Microsoft, Solaris vulnerabilities; top spyware threats; IPS use rising
-
A packet-shaping tool can help handle worm outbreaks.
-
Database and Imsecure vulnerabilities, search software flaw enables sophisticated phishing attack
-
Denial is not a legitimate wireless strategy
-
Finding code problems was the challenge; a service provider's analysis held the answer
-
Microsoft ISA vulnerability may lead to phishing attacks, a new version of MyDoom targets the IFRAME vulnerability in IE, and survey finds bank clients willing to defect over banks’ lack of ID theft protections
-
Better security updates in the offing
-
Highly critical IE vulnerability lacks patch; new attacks reanimate mobile AV
-
To more rapidly test patches and keep network configurations from drifting, keep a closer watch on every device’s configuration
-
Passwords protect user logon and resource access, but only if the underlying authentication protocols are secure. Here's how to overcome vulnerabilities of older protocols.
-
Setting the open-source security record straight
-
With the November 15 deadline looming for many organizations, many companies still don’t have a plan for auditing and archiving instant messages.
-
Blame unusable security, not users; Apple worm; high-speed IPS
-
New security-risk management tools bridge the security/business gap
-
Antivirus and browser vulnerabilities, unsubscribe may be unwise
-
Free hard-drive indexing utility raises corporate security and privacy questions
-
As more organizations embrace Web services (which opens back-office processes to partners and the Internet), a problem is emerging: who inside the organization is in charge of Web services security?
-
Domain name registrar copes with DoS spike