News

News Archive

  • December 14, 2005 14 Dec'05

    Flaws reported in Trend Micro ServerProtect

    Storage and security managers should be wary of vulnerabilities in the AV product that could enable a denial-of-service and malicious code execution. Workarounds are available.

  • December 14, 2005 14 Dec'05

    Hospital ditches EMC Centera for long-term archiving

    UHCS in Augusta, Ga., is replacing its Centera archiving system from EMC with IBM's GMAS product after performance, reliability and cost issues forced it to seek alternatives.

  • December 14, 2005 14 Dec'05

    Roundup: 2005's 'curious malicious code'

    These viruses, worms and Trojans sometimes escaped our notice. But it didn't get past one antivirus vendor, who rounded up some of the year's stranger offerings from the underground.

  • December 12, 2005 12 Dec'05

    Two Windows patches coming, IE fix uncertain

    It remains to be seen whether the software giant on Dec. 13 will address an outstanding Internet Explorer issue that is currently the target of a malicious Trojan.

  • December 12, 2005 12 Dec'05

    Titan Rain shows need for better training

    SANS says the Chinese-based attacks demonstrate the growing sophistication of hackers, and the need for IT admins who can articulate the dangers to execs.

  • December 12, 2005 12 Dec'05

    Experts: Encryption not a security cure-all

    Encrypting data offers some protection, but secure applications require much more than cryptography. Experts weigh in on your security options.

  • December 08, 2005 08 Dec'05

    IP cloaking becoming a business necessity

    Just by browsing your competitor's Web site, you might be giving away your company's most guarded secrets. Experts offer advice for countering the subterfuge and keeping secrets safe.

  • December 07, 2005 07 Dec'05

    Security pros gain ground in the board room

    Executives are paying more attention to their IT security managers and taking more responsibility for online threats against their companies, according to a new study.

  • December 06, 2005 06 Dec'05

    Cybersecurity policy takes cooperation, trust, experts say

    At the Infosecurity confab, experts explain why sharing information -- even when it's embarrassing -- is vital to securing not only corporations, but also the national infrastructure.

  • November 30, 2005 30 Nov'05

    Out-of-cycle IE patch may be imminent

    Microsoft may release a critical Internet Explorer fix before the next Patch Tuesday, amid reports that malicious code is targeting a memory corruption flaw.

  • November 29, 2005 29 Nov'05

    By the numbers: The new SOX breakdown

    SOX spending for 2006 is expected to be on par with last year but it's not quite dÉjÀ vu all over again. More dough will go to technology.

  • November 28, 2005 28 Nov'05

    Who owns and administers the internet's addresses?

    Given that IPv4 addresses are a finite resource, we can expect concerns over their distribution to increase in the coming years.

  • November 28, 2005 28 Nov'05

    Step 6: Configuring wireless clients

    With wireless networks proliferating it is a good idea to understand what it takes to build a VPN for a wireless gateway. Contributor and Microsoft MVP Brien Posey details the necessary steps in this step-by-step guide.

  • November 22, 2005 22 Nov'05

    Influential survey says security 'set back by 6 years'

    Update: The SANS Top 20 vulnerability list for 2005 shows the bad guys attacking flawed apps and paying more attention to network holes.