White-listing certain applications is one way to make sure your network stays safe.
- By Joern Wettern
- 05/01/2009
Companies looking to reduce costs through cloud computing will have to make some tough decisions about security.
- By Naomi Grossman
- 05/01/2009
How Adobe is handling critical vulnerability discovered in its Reader software gets mixed reaction from IT security experts.
- By Jabulani Leffall
- 05/01/2009
Microsoft rolled out Service Pack 2 (SP2) for Windows Vista and Windows Server 2008 in its "release to manufacturing" form.
Concerns about the security implications of evolving cloud computing technologies dominated last week's annual RSA Conference.
- By John K. Waters
- 04/28/2009
Microsoft moves to make worms less effective. Plus: RSA kicks off security conference season; Google to school IT pros on the perils of cross-site scripting; and the FBI weighs in on Conficker.
- By Jabulani Leffall
- 04/28/2009
Microsoft last week described improved security features in its upcoming Windows 7 operating system, currently in beta release.
- By Herb Torrens
- 04/27/2009
Writing more secure software is not a simple task, but it can and should be done for applications, experts say.
- By William Jackson
- 04/24/2009
Researchers from Finjan Software Inc. announced at the RSA Security conference the discovery of a new botnet on nearly 2 million infected computers -- many of them in U.S. government networks.
- By William Jackson
- 04/23/2009
At a time when everyone is watching the bottom line, there is an increasingly strong impetus to virtualize IT environments.
- By William Jackson
- 04/23/2009
There are a wealth of commercial tools available to help secure networks, but getting them to share information so that administrators have more than a piecemeal picture of their systems can be a challenge.
- By William Jackson
- 04/22/2009
Web browsers offered soft and interesting targets for hackers in 2008, who took advantage of them to attack the increasingly rich Web experience, said security expert Jeremiah Grossman.
- By William Jackson
- 04/21/2009
As cyber security problems become more widespread, Microsoft urged the IT community to take a more active role, and described its security approach.
- By Jabulani Leffall
- 04/21/2009
UAC not so snarky in Windows 7. Plus, .NET exploit; Internet dangers; hiring hackers.
- By Jabulani Leffall
- 04/21/2009
Microsoft announced the beta 2 release of "Stirling," which is the code name for an integrated suite of enterprise security solutions based on Forefront products.
- By Jabulani Leffall
- 04/16/2009
The number of compromised computers actively being used in botnets to launch attacks on any given day last year was about 75,000, according to a new report on Internet threats from Symantec Corp.
- By William Jackson
- 04/15/2009
Yes, Conficker manages to remain in minds of IT security. Plus: tweeting birds get the worm and why security standards equal a bad idea.
- By Jabulani Leffall
- 04/14/2009
Default security settings in Microsoft's Internet Explorer browser could open a company's intranet to hacking attacks, according to a recent security white paper.
The U.S. Computer Emergency Readiness Team warns that researchers on April 9 discovered a new variant of the Conficker worm that updates earlier infections via its peer-to-peer network.
- By William Jackson
- 04/10/2009
After some comparatively light patch rollouts in past months, Microsoft's April Patch Tuesday promises a fuller slate with eight security bulletins.
- By Jabulani Leffall
- 04/09/2009