-
Cheat sheet: 10 ways to prep for auditors
There are 10 ways to prepare for those auditors knocking at your door -- and avoid wasting time and money.30 Jun 2005
-
How to patch vulnerabilities and keep them sealed
Learn how to simplify the patch deployment process and employ methods that will reduce vulnerabilities.30 Jun 2005
-
CSO INTERVIEW: Regulatory pain is a two-way street
You might not expect someone from the agency enforcing the Sarbanes-Oxley Act to describe regulatory compliance as something bogged down with "bureaucratic overlap" that's "killing" enterprises.
...30 Jun 2005 -
Microsoft investigates reported IE flaws
Meanwhile, a fake Microsoft security bulletin circulates; attacks target Veritas; Cisco patches IOS flaw; senators file ID antitheft bill; and a worm poses as fake news reports.30 Jun 2005
-
If he had just paid the rent
In this excerpt of Chapter 3 from "High-Tech Crimes Revealed," author Steven Branigan introduces "Wesley" and the incidents that led to a computer forensics investigation.30 Jun 2005
-
Product Review: Symantec's first e-mail security appliance
Symantec's Mail Security 8200 series blends high-quality antispam technology and Symantec's antivirus server and policy-based content filtering.30 Jun 2005
-
Product Review: CrossTec firewall better suited for SMBs
NetOp Desktop Firewall 3.0 has management, documentation functions ideal for Windows desktops. But other lacking features keep it from moving up to enterprise-caliber.29 Jun 2005
-
Product Review: TriGeo Security Information Manager 3.0 sensible for SMBs
The latest version of TriGeo's Security Information Manager is a highly flexible, easy-to-manage appliance that's designed to support 50 to 5,000 active devices.29 Jun 2005
-
Microsoft offers final Windows 2000 Server rollup
The last update rollup for that server, Service Pack 4 does not contain new features; rather it includes just a rollup of security updates and hotfixes.29 Jun 2005
-
The not-so subtle art of contract negotiation
Outsourcing contracts are becoming more creative and more complex. This tip describes some new terms that you might see cropping up in your contracts.29 Jun 2005
-
Access points slim down for summer
Extreme says its slimmed-down access point is easier to provision, manage and secure; industry experts explain why "thin" APs are strutting their stuff this summer.29 Jun 2005
-
Product Review: Caymas 318 Access Gateway v2.5.1 simplifies protection
The Caymas 318 Access Gateway simplifies protection by combining access control, IDS/IPS, firewall capabilities, and endpoint and application security in one appliance.28 Jun 2005
-
Security Bytes: Flaws plague Adobe Reader, Acrobat
Also: Bagle/Mitglieder targets AV programs; consumers and merchants sue credit card companies over data theft; IBM, Linux face new flaws; and CA buys security firm.28 Jun 2005
-
Quick Quiz: IPv6
Test your knowledge of IPv6 and learn security tips in the process.27 Jun 2005
-
How to avoid phishing hooks: A checklist for your end users
Checklist of basic recommendations to share with your end users to teach them how to avoid phishing schemes.27 Jun 2005
-
Get ready for IPv6: Five security issues to consider
Learn about the potential hazards of migrating to IPv6 and how to ensure a smooth transition without jeopardizing your company's security.27 Jun 2005
-
Amazing Access
Finding a comprehensive identity and access management architecture requires leadership to navigate the technology and implementation labyrinth.24 Jun 2005
-
Meet the New Champions
CIGNA makes business managers responsible for security.24 Jun 2005
-
Mission Impossible
Seven ways to leverage your infrastructure against spyware.24 Jun 2005
-
All Aboard!
To gain buy-in and support for your security policies, it's best to start at the top.24 Jun 2005
Security Management Strategies for the CIO