-
Security and the summer slump
What happens when your limited IT staff heads for vacation? Can your small business cope with security problems while your go-to guy is on the beach?30 Jun 2004
-
Industry Notebook: Product releases from Juniper, Ounce Labs, RedCannon and CyberGuard
Juniper adds SAML to its SSL VPN, while Ounce Labs, RedCannon and CyberGuard all add functionality to their security software and tools.30 Jun 2004
-
Careful planning can help outsourcing pay off
When deciding to outsource, consider the security of the vendor and make sure you monitor it, according to an American Express executive.30 Jun 2004
-
Exploiting systems becoming easier, expert says
Increasingly complex networks leave many doors open for attacks and the next generation of threats is gunning for IM, WiFi and VoIP.29 Jun 2004
-
Sharing the responsibility of developing policies
Developing corporate policies isn't the sole responsibility of the information security department.29 Jun 2004
-
June 2004: The best of SearchSecurity
Peruse the top 10 news articles and tips published by SearchSecurity.com in June.29 Jun 2004
-
Recommendations issued to knock out spam
With legislation failing to stem the ever-growing tide of spam, an industry group issues recommendations for ISPs that could benefit everyone if widely implemented.28 Jun 2004
-
Spyware legislation sparks concern
This installment in a two-part series examines legislative effectiveness in handling spyware.28 Jun 2004
-
Attack blunted, but concerns remain
Though a malicious Web site that generated last week's widespread Internet attack is shut down, concern remains more damaging mischief looms.28 Jun 2004
-
Security Help Desk: Freeing yourself from spyware's grip
28 Jun 2004
-
UPDATED: Widespread attack under way
A widespread Internet attack has hit thousands of Web sites in the past week, planting malware on vulnerable machines. Credit card thefts suspected motivation.25 Jun 2004
-
Mobile IPv6: Mobility in a Wireless Internet
This excerpt is from Chapter 5, Securing Mobile IPv6 Signaling in Mobile IPv6: Mobility in a Wireless Internet written by Hesham Soliman and published by Addison Wesley.24 Jun 2004
-
Security software vulnerabilities: A unique and growing threat
Recent vulnerabilities in well-known security products show that this software suffers from the same kinds of problems as the applications and operating systems that administrators are constantly p...24 Jun 2004
-
Week 28: New technical manager challenges and pitfalls
In this column, Shelley Bard offers up some tips for the new technical manager.24 Jun 2004
-
Week 27: Credentials -- To be or not to be certified
In this week's column, Shelley Bard tackles certifications.24 Jun 2004
-
Document security fears force vendors to provide solutions
Digital office machines pose a threat to enterprises concerned with document security.24 Jun 2004
-
Latest Web services spec tackles application flaws
Application Vulnerability Description Language (AVDL), ratified an OASIS standard this week, automates the process of comparing vulnerability information and importing it to application firewalls a...24 Jun 2004
-
IEEE panel set to adopt new Wi-Fi standard
The 802.11i standard would make Wi-Fi products more secure.24 Jun 2004
-
Does SOX (under Section 404) mandate that we archive e-mail?
24 Jun 2004
-
Spam remains IT security issue
Spam can contain Trojans and viruses, as well as hog network bandwidth, and it's on the rise.24 Jun 2004
Security Management Strategies for the CIO