Security News & Reviews - Page 1430

More Security News

Keeping Up With Windows Fixes

|
For large enterprises, sorting through Microsoft Corp.'s bulletins on its latest security fixes and then determining which machines need what hot fix can be complex and time-consuming.

5 Steps to Enterprise Security - Step 4: Response

|
Learning from attacks is as important as stopping them.

Freeing Up the Network Bottlenecks

|
Nortel's Alteon Security Cluster targets firewalls and other security apps.

Survey: Even After Sept. 11, Security Lags

|
Corporate IT largely remains unprepared for preventing and overcoming breaches of information security despite the terrorist attacks of Sept. 11, a recent survey found.

The Express Way to Device Management

|
Configuring security devices is one of the most basic and time-consuming aspects of setting up a protection perimeter around IT assets.

Privacy Quiz Questioned

|
Microsoft defends its motive for questionnaire against criticism from EPIC, other advocacy groups.

Security Flaws in Popular FTP Daemon Exposed

|
The two weaknesses in versions 2.5.0, 2.6.0 and 2.6.1 of the server have been the subject of much discussion in the last few days on security mailing lists and Web sites and an exploit for one of the flaws has been making the rounds as well

Microsoft Issues Privacy Quiz

|
The tool takes the form of an interactive 10-question quiz that puts the user into one of six categories based on his answers

Nortel Looks to Ease Security Bottlenecks

|
Known collectively as the Alteon Security Cluster, the products include the Alteon Web Switch, Alteon Security Appliances and custom software

IBMs Pearson: Time to Tackle Privacy Is Now

|
Recently, IBM formed a first-of-its-kind Privacy Management Council, to examine the technologies and management practices that will be needed to protect consumer privacy.

Tool Measures W2K Security

|
Administrators who want to measure how well their Windows 2000 servers are secured will find a free security scanner from the not-for-profit Center for Internet Security a real help.

5 Steps to Enterprise Security - Step 3: Detection

|
Human touch turns log files into leads that block attacks on IT.

Enterprise Tech Videos