-
New Mimail variant more trick than treat
A variant of the mass-mailing Mimail worm surfaced today, and administrators are being warned that it's spreading quickly. The worm, which spreads as a Zip file, is not particularly destructive, bu...31 Oct 2003
-
Finding detailed virus definitions
31 Oct 2003
-
Computer Security: 20 Things Every Employee Should Know
One of the 20 things every employee should know is the importance of secure passwords.31 Oct 2003
-
Policy for using split tunnels
31 Oct 2003
-
Comparing Microsoft IIS and Apache Web servers
30 Oct 2003
-
Assessments identify security shortcomings
Information security assessments clarify what data in an enterprise needs to be secured, where vulnerabilities may lie and how they should be mitigated.30 Oct 2003
-
Security pros can leverage spam-busting with management
Spam reduction in an enterprise is tangible evidence of success for a security professional, an expert said. When members of management get fewer junk e-mail messages in their inboxes, they have vi...30 Oct 2003
-
Network command center gives admins the big security picture
David Strom takes a look at Symantec's Deep Sight Threat Management System (TMS) and Alert Services.29 Oct 2003
-
Quick Takes: RSA secures Lotus Notes
RSA Security announced ClearTrust access management software for Lotus Notes, leading off this edition of Quick Takes. Also included are items from SonicWall, Cerberian, GFI, Lumigent Technologies ...28 Oct 2003
-
Sober-A worm pretends to be virus fix
A new mass-mailing worm is in the wild, spreading via some old techniques. Sober-A does have a couple of new twists, though, including a flair for German.27 Oct 2003
-
Coming soon: Intrusion detection cheat sheet from SANS
The SANS Institute is developing a Sysadmin Cheat Sheet for Detecting Intrusions, due out in December.27 Oct 2003
-
System administrators -- the security manager's untapped resource
Enterprise security officers need help, experts say, and it doesn't necessarily need to come from outside the organization. General IT staff might be a good place to start.27 Oct 2003
-
Selling security up corporate ladder an uphill battle
Surveys say more companies are spending more to secure their digital information, but those in the trenches say building a budget is still an uphill battle.24 Oct 2003
-
A reality checklist for an effective security policy
Here are three things to consider when writing policy statements.23 Oct 2003
-
Digital signatures and HIPAA
22 Oct 2003
-
Trouble getting rid of Klen.z virus
22 Oct 2003
-
Quick Takes: Trend Micro looks to eEye Digital
Trend Micro teams up with eEye Digital Security, leading off this edition of Quick Takes. Also included are items from ISS, Novell, NetScreen and Platform Logic.22 Oct 2003
-
Setting a policy for laptop screensaver timeouts
22 Oct 2003
-
Gartner: Security budgets are up, so is accountability
An analyst at the Gartner ITxpo said IT administrators and security officers will be held to a higher degree of accountability in 2004 because security budgets are inching upward.21 Oct 2003
-
Schmidt: Current security model ignores threats to SMBs
Former cybersecurity czar Howard Schmidt said last week that the majority of U.S. businesses are small or medium-sized and that security is often inaccessible to them.21 Oct 2003
Security Management Strategies for the CIO