Enterprises seeking to improve control of outbound and inbound e-mail are getting help in a new offering from anti-spam software developer Proofpoint Inc.
Continuing a...
WASHINGTON—Patch management, compliance and vulnerability management all vied for the attention of attendees on Monday at the Computer Security Institutes annual Computer Security conference...
Recognizing the growing need for anti-spyware solutions in the enterprise, Computer Associates International Inc. on Monday announced new software designed to tackle unwanted spyware,...
Things are getting a bit testy in the application-security market.
Saying that theyre fed up with some security vendors claiming that their products protect against...
One year after a vulnerability in the Wi-Fi Protected Access encryption algorithm was reported, a proof-of-concept program for the attack has been released.The attack...
A new phishing attack is utilizing a vulnerability in Internet Explorer, patched early this year, to hide its true source.
/zimages/2/28571.gifA serious hole in IE...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...