IT managers face daunting challenges next year: stopping spam, keeping systems up-to-date and tracking user identity. To surmount these obstacles, eWEEK Labs believes IT...
Effective security testing of new IT products is constrained by staff shortages, inadequate equipment and crunched time—in short, by a scarcity of resources. But...
Another candidate in the growing list of exploits on instant messaging clients and servers arrived in the wild. Called W32.Funner, the worm on Monday...
Computer security has two fundamental problems. The first is that computers dont know very much. The second problem is that people forget the first.
Vulnerabilities...
In the beginning, there were pictures of women on the Internet, and they were without clothing. And the industry created content-filtering software to protect...
Microsoft Corp. is investigating a reported security flaw in its ASP.NET technology that could allow intruders to access password-protected sections of a Web site...
WASHINGTON—The U.S. House of Representatives on Thursday overwhelmingly passed a bill that would make spyware illegal—and provide stiff sanctions for anyone found breaking that...
In a suprising move designed to solidify its position in the lucrative identity management market, Computer Associates International Inc. on Wednesday agreed to acquire...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...