HomeCybersecurity

Cybersecurity

U.S. Agencies Take Security Into Their Own Hands

Chief information security officers at federal agencies are more concerned about the quality of the software they buy than they were a year ago,...

Tivoli Automates Remote Backup

IBMs Tivoli unit is providing a backup safety net for businesses trying to cope with growing legions of remote workers storing critical information on...

CipherTrust Tool Blocks Spam

Messaging security vendor CipherTrust Inc. this week will roll out a new appliance that stops spam and other unwanted messages before they hit corporate...

Symantec, SonicWall Unveil New Security Gear

Two new all-in-one security appliances from Symantec and SonicWall will offer customers of gigabit Ethernet performance a variety of security functions including firewall, antivirus...

Real Research or a Marketing Ploy?

The impact of regulatory compliance on IT security is nearly impossible to measure accurately. However, a research survey launched on Aug. 24 by BindView...

Reports: Long Registry Names Could Hide Malware

Reports on the Full-Disclosure research list and by the SANS Internet Storm Center indicate a common bug in software that interacts with the Windows...

For Safe Updates, Build a Better Firewall

Im one of those people that everyone comes to with their computer problems. The other day my electrician was telling me how he went...

Zotob Worm Suspects Arrested

Two men in Turkey and Morocco have been arrested in connection with the creation and distribution of the malicious code that triggered the Zotob...

Inside Microsofts Zotob Situation Room

When Microsoft Corp. shipped the MS05-039 bulletin on Aug. 9 to patch a "critical" flaw in the Windows Plug and Play service, there was...

Colleges Lead Charge for Secure, Open Networks

After being stung by high-profile cases of data theft, prominent colleges and universities are in the forefront of efforts to introduce effective security to...