News

IT risk management

  • November 10, 2005 10 Nov'05

    Security Bytes: FTC cracks down on alleged spyware distributors

    Patches fix serious RealPlayer flaws, IM malcode launches phishing attacks; Microsoft warns of Macromedia Flash flaw; Liberty Alliance pushes stronger authentication; FEMA data security is in question; patches fix Veritas flaws and TransUnion ...

  • November 09, 2005 09 Nov'05

    Trojans target Sony DRM and Windows

    Security researchers track two new Trojan horses. One exploits the Sony DRM program. The other could possibly take aim at the Windows flaw Microsoft patched this week.

  • November 08, 2005 08 Nov'05

    Sony takes second stab at DRM patch

    But a top executive's response to criticism over the company's use of rootkit technology has added fuel to the backlash.

  • October 24, 2005 24 Oct'05

    Reporter's Notebook: NYC 'controls the software industry'

    At Information Security Decisions: a security "rock star" rages against the Microsoft machine; banging the drum for enterprise security; a sour note on zero-day exploits.

  • October 19, 2005 19 Oct'05

    Elements of a data protection strategy

    In this excerpt from Data Protection and Lifecycle Management, Tom Petrocelli addresses the importance of securing data for regulatory compliance and outlines the five components of a data protection strategy.

  • October 17, 2005 17 Oct'05

    How avian flu could threaten IT security

    Experts say a potential bird flu pandemic could have a disastrous effect on IT infrastructures. But if companies plan well, those infrastructures could also help minimize chaos.

  • October 12, 2005 12 Oct'05

    Quiz: What's your infosec IQ?

    We've collected our toughest questions to see how well you stand up to a challenge. Put your knowledge to the test and let us know how you do.

  • September 27, 2005 27 Sep'05

    Secure your extended enterprise

    How do you achieve the fine balance between ensuring that there is truly free access to sensitive information, without sacrificing security?

  • September 26, 2005 26 Sep'05

    Secure the interests of your extended enterprise

    How do you achieve the fine balance between ensuring that there is truly free access to sensitive information and applications from both inside and outside the firewall, without sacrificing security?

  • September 22, 2005 22 Sep'05

    Who best to avert data security disaster: government or business?

    People look to government to prevent catastrophe. But in the Information Age, some of those people, namely those working in IT shops, need to do their part to protect us.