-
Top 20 Windows/Unix vulnerabilities, Microsoft flaws and fixes
-
Identifying business assets to aid threat mitigation
-
There are two primary methods for auditing computers with security templates: manually and using a script command. We explain the benefits and drawbacks of each.
-
How one financial company distributes secure information to its board of directors, many of whom work in an insecure environment
-
Human error and security; AOL's two-factor authentication; September viruses
-
Knowing how today's hackers think and work is the first step to combating their attacks.
-
Increasingly, PCs must prove they're secure before a user can log onto the network
-
Creating a baseline of security for servers and clients is essential for a secure environment.
-
Software vaults are increasingly the solution for securing passwords, notes from the board of directors, and more
-
IT must cope with under-funded regulations, more CIO leeway
-
RealPlayer and JPEG vulnerabilities; security insurance
-
Symantec's assessment of system vulnerabilities in the first half of this year shows a dramatic increase in the number and potential destruction of security threats.
-
Smart cards, currently a favorite of governments and large corporations, are getting more powerful, incorporating Java and USB technologies.
-
Banks help ID thieves; unified security appliances; server security
-
Symantec grabs @Stake; JPEG vulnerabilities; Mozilla holes; Sniffer worm
-
Under pressure from such regulations as HIPAA, the Gramm-Leach-Bliley Act, and Sarbanes-Oxley, companies increasingly have to account for their corporate instant messaging policies. Yet many organizations don’t have rules for IM use.
-
How one company found an outsourcer able to manage its network equipment and offer cogent security advice
-
Office uses one-stop monitoring for attacks and vulnerabilities
-
New security legislation; the future of e-mail and IM security
-
Most attacks are relatively unsophisticated, planned in advance, conducted during normal business hours, and start from inside the organization. The common driver comes as no surprise: money.
-
Managed security service providers to dominate security market by 2010
-
Most unsolicited e-mail originates in U.S., survey finds; securing storage; name-dropping attacks
-
Once they seemed doomed, but public key infrastructure is taking off, driven by e-commerce servers, Pentagon requirements, and government regulations.
-
Your security policy has to have teeth. Here's how to enforce your endpoint security policy.
-
Aeroplan adopts an XML firewall