• October 31, 2006 31 Oct'06

    Podcast: Top 5 quick tips for safer instant messaging

    Michael Cobb of Cobweb Applications counts down five quick tips that can secure IM in the enterprise. Cobb discusses account naming rules, acceptable use policy, instant messaging encryption and much more.  Continue Reading

  • October 31, 2006 31 Oct'06

    Quiz: Secure instant messaging

    A five-question multiple choice quiz to test your understanding of the content presented in the Secure instant messaging lesson of SearchSecurity.com's Messaging Security School.  Continue Reading

  • October 31, 2006 31 Oct'06

    Taking the bite out of Bluetooth

    Bluetooth has become a ubiquitous short-range wireless protocol embedded in many mobile devices, but it has been plagued by security threats. In this tip, Lisa Phifer details those threats and explains how any organization can stay safe by following...  Continue Reading

  • October 31, 2006 31 Oct'06

    Firefox fans unfazed by IE 7

    IT administrators like the security improvements in IE 7. But for those who use Firefox, Microsoft's browser upgrade isn't enough to make them switch.  Continue Reading

  • October 31, 2006 31 Oct'06

    Latest IM attacks still rely on social engineering

    In the age of email-borne superworms, email recipients would often become victims without any interaction or warning. However, as Michael Cobb explains, many of today's most dangerous instant messaging attacks require user interaction, meaning wary,...  Continue Reading

  • October 31, 2006 31 Oct'06

    Messaging Security School

    SearchSecurity.com's Messaging Security School has brought together some of the most knowledgeable experts in the messaging security field to offer you personal instruction on how to secure the information handled by your organization's knowledge ...  Continue Reading

  • October 31, 2006 31 Oct'06

    Countermeasures for malicious email code

    Today's malware continues to raise the security stakes. Enterprises are now facing numerous evolving threats like targeted and blended attacks, zero-day exploits, botnets and phishing schemes. The attacks aren't the only things evolving; so are ...  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close