News

News

  • January 17, 2008 17 Jan'08

    Spam, phishing, IM attacks rise

    Malicious attacks using social engineering techniques are on the rise. While botnets may finally be forcing ISPs into the battle, enterprise security pros are working overtime on strategies to keep the threats at bay.

  • January 17, 2008 17 Jan'08

    Finjan: Attackers wild about widgets

    In a new report, security firm Finjan says the digital underground will have no trouble finding flaws to exploit in the widgets most Web users take for granted.

  • January 17, 2008 17 Jan'08

    Business survival 101: How to perform a business impact analysis

    A business impact analysis can be a manual that helps your company weather disasters. Here are some pointers on how to put one together.

  • January 17, 2008 17 Jan'08

    Privacy breaches: How to avoid making headlines

    Wave of privacy breaches demands integrated approach to physical and IT security. What can your organization do to avoid being the next headline?

  • January 17, 2008 17 Jan'08

    From IT geek to security rock star

    Those who recognize change, bond with colleagues outside IT and factor physical security into their daily routine can go from IT geek to security rock star, experts say.

  • January 17, 2008 17 Jan'08

    Time will narrow gap between physical, IT security

    The convergence of physical and IT security departments within the enterprise may be inevitable, according to some CISOs and analysts, but this union will take time to form.

  • January 17, 2008 17 Jan'08

    Trojan.Silentbanker targeting banks

    A new trojan has targeted over 400 banks and, even more worrying, has the ability to circumvent two-factor authentication.

  • January 17, 2008 17 Jan'08

    Experts: Place wireless security on equal footing with wired

    A study of wireless local area networks in London revealed that the number of access points tripled in a year, yet data was encrypted on only one-third of those points.

  • January 17, 2008 17 Jan'08

    Biometrics: Improving, but not perfect

    Though improving, biometrics is still held back by unproven technology, competing standards and lingering privacy concerns.

  • January 17, 2008 17 Jan'08

    Federated ID: Still not ready for prime time

    At the Burton Group Catalyst Conference, analysts will outline obstacles that keep federation technology from going mainstream, despite its potential to solve big business security problems.

  • January 17, 2008 17 Jan'08

    TD Ameritrade database hacked, customer data stolen

    Hackers stole data including customer names, addresses and phone numbers from the online broker's database.

  • January 17, 2008 17 Jan'08

    Operational risk another facet of compliance

    Fortune 500 summit examines operational risk management as a key challenge for financial institutions.

  • January 17, 2008 17 Jan'08

    Reporter's Notebook: Why failing an audit can lead to success

    At Information Security Decisions, attendees discuss cash-strapped compliance efforts, the premature demise of IDS, job security courtesy of Microsoft and more.

  • January 17, 2008 17 Jan'08

    Opinion: Government misses its chance to protect data

    The unending stream of corporate and government data breaches shows no signs of slowing, and News Director Dennis Fisher writes that lawmakers and government officals are missing their chance to fill the breach.

  • January 17, 2008 17 Jan'08

    Data breach law could put financial burden on retailers

    Legislation being considered in Massachusetts would shift the financial burden associated with a data breach onto retailers. It would be the first of its kind in the United States.

-ADS BY GOOGLE

SearchSecurity

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

ComputerWeekly.com

Close