-
Data breach costs soar
A Ponemon Institute study indicates the costs associated with data breaches have soared and will continue to skyrocket unless companies do more to prevent them in the first place.29 Nov 2007
-
With data breach costs soaring, companies should review data sharing policies
Companies are sharing intellectual property in increasing numbers, but many organizations fail to monitor and enforce their policies, according to a recent survey.29 Nov 2007
-
Product focus evolves in volatile data loss prevention market
Various tools and methods are emerging in the DLP market even as that market undergoes consolidation.29 Nov 2007
-
How can root and administrator privileges of different systems be delegated on one account?
In this expert response, Joel Dubin discusses how corporations can manage "superuser" accounts by delegating root and administrator privileges.28 Nov 2007
-
Podcast: Countdown --Top 5 technologies to help battle the new spam threat
In this featured podcast, Michael Cobb counts down the top 5 ways for your company to battle new and evolving spam threats, and discusses the pros and cons of current antispam technologies.27 Nov 2007
-
Quiz: Spam 2.0 -- New threats and new strategies
A five-question multiple-choice quiz to test your understanding of spam defense strategies presented by expert Michael Cobb in this lesson of SearchSecurity.com's Messaging Security School.27 Nov 2007
-
Will FTP ever be a secure way to transfer files?
A SearchSecurity.com member asks our network security expert Mike Chapple: Is the File Transfer Protocol a secure way to transfer files? As one of his many monthly responses to readers, Chapple rev...27 Nov 2007
-
Webroot adds email security with SaaS acquisition
Webroot adds email archiving, encryption and Web filtering with the acquisition of UK-based Email Systems.27 Nov 2007
-
IBM Lotus Notes critical flaw affects file viewing
Attackers can exploit the flaw remotely to crash the application or gain access to a victim's machine.27 Nov 2007
-
Mozilla plugs Firefox flaws
Firefox 2.0.0.10 addresses multiple flaws attackers could have exploited to conduct cross-site request forgery attacks and potentially hijack a user's computer.27 Nov 2007
-
Preventing spam bots from hijacking an enterprise network
According to security expert Michael Cobb, the likelihood of your enterprise being compromised by a botnet is not a question of if, but when. In this Messaging Security School tip, Cobb discusses h...27 Nov 2007
-
Spam 2.0: New attacks, viruses and prevention strategies
In the war on spam, new battlefronts are constantly emerging. Learn how security professionals can stay on top of the latest email threats.26 Nov 2007
-
Exploit code targets Apple QuickTime zero-day
Several security organizations have noted the appearance of exploit code against a zero-day buffer-overflow flaw in Apple's widely used QuickTime media player.26 Nov 2007
-
Should PKI systems be used for laptop encryption?
In this expert reponse, Joel Dubin discusses the pros and cons of using PKI systems for laptop encryption.20 Nov 2007
-
Group releases Java standards for secure development
The Secure Programming Council is releasing a set of essential skills for Java developers in an effort to improve software security and educate new programmers.20 Nov 2007
-
Audio codec flaw imperils multiple applications
Multiple vendors are affected by a serious Free-Lossless Audio Codec (FLAC) flaw attackers could exploit to hijack targeted systems, US-CERT and eEye Digital Security warned.20 Nov 2007
-
Solving the RFID Dilemma
How do you pack enough security--cheaply--into those little chips?20 Nov 2007
-
Secure remote access: Closing the Windows Mobile Smartphone loophole
After years of waiting, smartphones are finally being used to access corporate networks. But security programs for Windows laptops won't run as-is on Windows Mobile devices, leading users to engage...20 Nov 2007
-
Experts: Privacy and security officers living in silos
To better deal with the data breach threat, industry experts say security and privacy officers must work as a team.20 Nov 2007
-
Cybersquatters, phishers sharpen tactics for holiday season
Consumers may have a greater chance of getting scammed this holiday season thanks to cybsersquatters and phishers offering free gift cards and brand name items.19 Nov 2007
Security Management Strategies for the CIO