HomeCybersecurity

Cybersecurity

App Assesses Risk of Changes Beforehand

Even in the most sophisticated network operations groups, knowing whether a proposed change to a router or firewall configuration will have its intended effect...

DHS to State Its Case to Business

Improving cyber-security may be in the public interest, but to persuade the commercial owners of the countrys critical infrastructure to invest in more secure...

Windows 2000 Patch Is Causing Trouble

Microsofts patch for a worm-vulnerable security flaw in Windows 2000 is causing problems for some users.Microsoft recently confirmed several "isolated deployment issues" with the...

Microsoft Welcomes Hackers

Microsoft Corp., once known for its tightly controlled, if not opaque, security processes, recently invited a small number of hackers onto its Redmond, Wash.,...

Agency Report Pans Passwords

U.S. banks that havent already done so should put plans for shoring up e-banking security into high gear, according to new guidance from the...

Symantec Boosts Data Protection

With the release of Backup Exec 10d (formerly code-named Panther), Symantec Corp. is providing IT managers with continuous data protection capabilities, self-service data retrieval...

Servers Travel Back in Time with Symantec

Symantec Corp.s LiveState Recovery Advanced Server Suite 6.0, like its predecessors, specializes in resurrecting corrupted or damaged systems. However, Version 6.0 gains an important...

Alliance Tackles VOIP Security Threats

As the volume of phone calls carried over IP grows, so does the threat of voice spam. From the perspective of those who hold...

Chinese Legal System Hinders IP Protection Efforts

If finding a software pirate is as simple as walking down the street and looking around for wheelbarrows, why is China—home of the largest...

Developing Securitys New Image

Federal agencies and contractors have until Oct. 27 to define a new standard of personal identification. Thats the deadline for compliance with the first...