At its Professional Developers Conference in Los Angeles this week, Microsoft is unveiling the end-to-end vision for its Software plus Services platform.
- By Kathleen Richards
- 10/27/2008
The IT security function, as a percentage of total IT staff at enterprise organizations, appears to be in decline, according to an addendum on security in a research report released this week by Computer Economics.
- By Jabulani Leffall
- 10/27/2008
Looking for the coolest jobs in IT? A new survey of information technology and network security specialists suggests that the place to look is on the front lines of cyberspace -- and that the variety of work is greater than many might suspect.
Redmond on Thursday released a critical out-of-cycle security patch affecting Windows 2000, Windows XP and Windows Server 2003 systems.
- By Jabulani Leffall
- 10/23/2008
"Disaster breeds opportunity," so the old slogan goes. But when it comes to uncertain economic times, companies should double-check their internal policies and procedures, security experts say.
- By Jabulani Leffall
- 10/22/2008
Enterprise IT professionals concerned about laptops holding proprietary corporate data should be heartened by a new 3G mobile security technology update from Alcatel-Lucent.
- By Jim Barthold
- 10/21/2008
What's the top threat to data security going to be in 2009? According to the GTISC Emerging Cyber Threats Report for 2009 out of Georgia Tech's Information Security Center, the answer is malware specifically disguised as "benign social networking links."
Sophos quickly warns of fake Trojan-laden e-mail disguised as Microsoft Security Bulletin update hitting inboxes.
- By Jabulani Leffall
- 10/16/2008
Plus: shedding more light on version 2 of Microsoft's RIA app; Citrix looking for total virtualization domination.
Security-minded admins have their work cut out for them, as Microsoft coughs up 11 fixes in its October patch cycle.
- By Jabulani Leffall
- 10/14/2008
Microsoft has been talking about future changes to Windows Vista's most maligned feature, User Account Control (UAC).
- By Herb Torrens
- 10/13/2008
New security appliance gives DBAs a leg up on flaws and vulnerabilities lurking in corporate database management systems.
- By Jabulani Leffall
- 10/13/2008
Microsoft's October patch release cycle promises to be a busy one as Redmond announced plans to roll out 11 security bulletins in its Tuesday security release.
- By Jabulani Leffall
- 10/09/2008
A new study from Gartner concludes that the WLANs of today comprise a "significant vulnerability" for enterprise IT organizations.
- By Stephen Swoyer
- 10/07/2008
Migration to virtualization won't be the quick transition that some technology evangelists have predicted, according to recent surveys by two IT security companies.
- By Jabulani Leffall
- 10/07/2008
Jet-setters should be careful about how they use the Internet connections supplied by hotels, as most are not secured properly, according to a new study from the Cornell University School of Hotel Administration.
- By Joab Jackson
- 10/03/2008
Yahoo plans to resolve a password security vulnerability identified last week in its Zimbra open source e-mail and collaboration software.
- By Jabulani Leffall
- 10/02/2008
You can talk about SCADA. You can talk about vulnerabilities. But be careful about conflating the two.
Managing users' multiple identities -- and their multiple phases -- can get complicated. That's where ILM comes in.
- By Joern Wettern
- 10/01/2008
The Payment Card Industry Council on Wednesday released an updated version of its PCI data security standard, which is designed to help protect transmitted charge and debit card information.
- By Jabulani Leffall
- 10/01/2008