With the threat of a sophisticated spyware attack looming, a renowned security researcher says the most popular detection and removal tools "fail miserably" at...
A highly critical vulnerability in Sun Microsystems Inc.s Java plug-in has been discovered by a Finnish security consultant. The vulnerability could potentially allow a...
As IT moves deeper into network security, AT&T Corp. is preparing managed offerings that company officials hope will change the way enterprises think about...
In Websense Inc.s Websense Enterprise Version 5.5, the Internet access control vendor has effectively added real-time Internet attack protection to its list of dos...
Most security vendors have moved away from signature-based detection of attacks to behavior or anomaly-based solutions, but a small group of companies has eschewed...
Cyber-crime is running amok.Hackers are continuously finding new ways to break into corporate networks and steal proprietary and sensitive data. Virus writers are elevating...
The absence of an official patch from Microsoft for a known and widely exploited Internet Explorer flaw has spawned a cottage industry for homegrown...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...