Security News & Reviews - Page 1452

More Security News

Seek and Destroy

|
New network weapons freeze attacks on sight

Shakeout Threatens Managed Security Clients

|
Rapid consolidation in the managed security business can have costly results for corporations that entrust the safety of their most valuable information to companies in danger of disappearing tomorrow

Passport Under Fire

|
Privacy, consumer groups petition FTC over services, XP.

Private Vigilance

|
While the government lumbers along with a muddled potpourri of public and semipublic centers and councils to fight cybercrime, a handful of private organizations offer an alternative.

Code Red Is Old Hat, If Youve Kept Your Head Out of the Sand

|
Unless you've been hiding under a rock for the past few weeks, you've probably heard all you ever wanted to know about the so-called "Code Red" crisis that's been clogging networks worldwide since its discovery on July 19.

Alliance Takes on DDoS

|
McAfee, trio share research, combine on tools.

Insurer: Microsoft Is a Costly Choice

|
Insurance broker J.S. Wurzler Underwriting Managers has started charging up to 15 percent more in premiums to clients that use Microsoft's Internet Information Server software, which the Code Red worm feasted on.

Security With a Patent

|
McAfee.com has won a patent that will protect its rapidly growing business for updating and managing security on desktop computer systems via the Internet.

Leave Security to Insiders

|
Protecting networks from outside attack is far too important to just run "by the numbers."

Ballmer Stirs Crowd With Monster Mash

|
Images of "Young Frankenstein" came rushing back to the Whiskered One last week as he watched a video clip of Steve Ballmer that was making its way around the Web.

Wireless LANs Dealt New Blow

|
Security goes from bad to worse

Deluge of Security Threats Overwhelms I-Managers

|
System vulnerabilities - holes through which intruders may crawl inside your servers - are cropping up at a rate six or seven per day, a pace that strains the resources of most system administrators, security experts say.

Enterprise Tech Videos