Security News & Reviews - Page 1441

More Security News

Can You Keep a Secret?

|
Show your customers how to develop Internet privacy policies before real problems arise.

On Alert

|
Call Terry Benzel an unwilling prophet of potential disaster.

Weaker Variant of Nimda on the Loose

|
Anti-virus experts say that PE_Nimda.E is unlikely to even approach the level of infection achieved by the original version of Nimda.

Privacy Battle Lines Drawn

|
America's next civil war will be fought on the Internet, and the fundamental values in question will be the right to privacy versus the need for national security.

Web Server Security—Now!

|
Defeating a web site attack by spending a few hours patching and testing may give you the feeling of winning-but only until you stop and think of how many such grueling exercises you've been through and how many more you will have to endure.

Secure E-Mail Gaining

|
The dream of secure e-mail is more alive today than ever, as technology emerges that takes the difficulty out of encryption, and the complexity out of the hands of the user.

Killing the Messenger

|
All of us, at some point in our lives, have blamed someone else for a mistake we made. But in the end, we realized what we did was wrong.

Anthrax Attacks Lend Urgency to Biosurveillance

|
Efforts to develop real-time, web-based surveillance systems for evidence of biological and chemical terrorism are gaining steam and urgency because of the recent anthrax attacks around the country.

More Surveillance Comes With a Cost

|
Electronic communications less private; pricey

Rethinking the Security Supermarket

|
The Sept. 11 terrorist attacks have bred a heightened awareness of security, and as I-managers re-examine security infrastructure, a familiar question has resurfaced: Is it better to choose best-of-breed security products, or an integrated security suite

Microsoft Issues Patch With Problems

|
Customers unhappy, say testing should have caught it, company failed.

IBM Targets Access Control With Security

|
The ever-growing size and complexity of enterprise networks has greatly complicated the administrator's task of keeping intruders out while allowing authorized users in. But new access management products from IBM and Camelot IT aim to ease that burden.

Enterprise Tech Videos