News

News

  • January 17, 2008 17 Jan'08

    Spam, phishing, IM attacks rise

    Malicious attacks using social engineering techniques are on the rise. While botnets may finally be forcing ISPs into the battle, enterprise security pros are working overtime on strategies to keep the threats at bay.

  • January 17, 2008 17 Jan'08

    Finjan: Attackers wild about widgets

    In a new report, security firm Finjan says the digital underground will have no trouble finding flaws to exploit in the widgets most Web users take for granted.

  • January 17, 2008 17 Jan'08

    Privacy breaches: How to avoid making headlines

    Wave of privacy breaches demands integrated approach to physical and IT security. What can your organization do to avoid being the next headline?

  • January 17, 2008 17 Jan'08

    From IT geek to security rock star

    Those who recognize change, bond with colleagues outside IT and factor physical security into their daily routine can go from IT geek to security rock star, experts say.

  • January 17, 2008 17 Jan'08

    Time will narrow gap between physical, IT security

    The convergence of physical and IT security departments within the enterprise may be inevitable, according to some CISOs and analysts, but this union will take time to form.

  • January 17, 2008 17 Jan'08

    Keynoters push for ID federation, harsher laws

    Top executives for two of the industry's biggest companies stressed working together to rebuild trust through open authentication standards and stiffer database breach laws.

  • January 17, 2008 17 Jan'08

    Hashing out stronger password authentication

    Stanford University researchers have created a browser extension to improve Web security and prevent phishing and other attacks.

  • January 17, 2008 17 Jan'08

    Verizon security chief says protect your data first

    ATLANTA -- JP Callahan, a former counter-intelligence agent with the U.S. Department of Defense, runs data center security for Verizon Business, the company's data center hosting arm. While Callahan has the demeanor of a standup comedian rather ...

  • January 17, 2008 17 Jan'08

    On-demand log management gets the nod

    Alert Logic says the SaaS model is a good fit for companies needing help with log management for compliance purposes

  • January 17, 2008 17 Jan'08

    Discarded hard drives can be dangerous

    A treasure trove of sensitive information can end up in the wrong hands if old hard drives aren't properly disposed of, one security expert warns.

  • January 17, 2008 17 Jan'08

    Audit your organization year-round for best results, experts say

    Compliance officers can save themselves a lot of grief by following a schedule that mirrors the National Football League, a CISO at the Burton Group Catalyst Conference said.

  • January 17, 2008 17 Jan'08

    Survey: Life back on track at financial firms after SOX

    Once a major pain point for companies, a recent survey shows SOX is now part of everyday life, especially at financial firms.

  • January 17, 2008 17 Jan'08

    Experts: Security no excuse for avoiding mobile devices

    Enterprises shy away from mobile devices for fear of losing sensitive data, but experts say those fears are unwarranted.

  • January 17, 2008 17 Jan'08

    Cooperating with law enforcement for U.S. security

    We need to collaborate on suspected information. ISPs have a responsibility to the users, as such, they should cooperate with law enforcement to continue to monitor the security of U.S. perimeters.

  • January 17, 2008 17 Jan'08

    SSL VPN use is all about security

    A recent Infonetics poll of 250 companies found that security, not cost or easier user access, is still the biggest driver for deploying SSL VPNs.

-ADS BY GOOGLE

SearchSecurity

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

ComputerWeekly.com

Close