Security News & Reviews - Page 1327

More Security News

Microsoft and the Liberty Alliance

|
Sun Microsystems and Microsoft are squaring off over identity authentication systems.

Guardent Unveils Security Appliance

|
The appliance is the centerpiece of a new service from the managed-security services company that will integrate security technologies with Guardent¡¯s ability to correlate event data

Goner Finds Users Napping

|
The Goner worm that tore through corporate networks last week is just the latest evidence that virus writers and crackers are growing ever more skillful.

A Look at Past to Better View the Horizon

|
"IT" turned out to be an overpriced gyro scooter. Excite @Home turned out to be anything but. The Goner virus proved that Outlook users are no safer this year than last.

Step 5: Vigilance

|
Finally, there is no finally: Vigilance the last security step, but the beginning of a job that's never done.

Feds Cast a Wider Wiretap Net

|
In wake of the Sept. 11 attacks, FBI makes more requests of telecom carriers.

Battening Down Security Hatches

|
Federal government to push standards on agencies and private industry.

Israeli Teens Held in Goner Virus Probe

|
The youths, aged 15 and 16, are high school students from Nahariya, in the northern part of Israel, according to a police statement

Gingrich Warns of Evolving Threats

|
Striking a cautious note, Newt Gingrich at the InfoSecurity Conference warned that networks will be the targets of new and varied threats that aren't even on the map at present.

Goner Virus Starts Making the Rounds

|
A new mass-mailing virus, known as W32/Goner.A, has been spotted in Europe and is now beginning to spread in the United States.

Microsoft Works to Lock Down .Net

|
In an effort to improve its battered security reputation, Microsoft is subjecting elements of its loosely defined .Net Framework to unprecedented levels of scrutiny.

The Express Way to Device Management

|
Configuring security devices is one of the most basic and time-consuming aspects of setting up a protection perimeter around IT assets.

Enterprise Tech Videos