McAfee Aims to Secure Forgotten Files By Judy Mottl -
Published June 10, 2008
Vendor pushes out tools to protect out-facing SAP systems, virtualized files. [more Prevention & Risk Management ]
McAfee Touts Better Endpoint Protection By Andy Patrizio -
Published June 5, 2008
New secure USB drive and laptop audit trail on tap. Separately, McAfee also updates its rankings of the most dangerous domains. [more Prevention & Risk Management ]
Motorola's 'Good' Moves in Secure Mobile Access By Judy Mottl -
Published June 4, 2008
Handset giant's Good Technology unit intros VPN desgned for broader, safer application use on wireless devices. [more esecurityplanet ]
Beating Online Fraud With a Phone By Richard Adhikari -
Published June 3, 2008
Latest effort to revisit the authentication security token. [more esecurityplanet ]
Trend Micro Revises Data Loss Shields for SMB By Andy Patrizio -
Published June 2, 2008
New version of Worry-Free Business Security 5.0 includes protection for Exchange mail servers and QuickBooks files. [more esecurityplanet ]
Review: Symantec Online Backup By Gerry Blackwell -
Published May 30, 2008
The company known for protecting data from digital vermin now offers an online data backup service. What's Symantec got in store(age) for you? [more Security Best Practices ]
Orphaned User Accounts Run Wild in Enterprises By Richard Adhikari -
Published May 29, 2008
The old accounts of ex-employees, partners and contractors may represent a major security hole, but few businesses are doing much about it. [more Information Security Trends ]
VoIP Security: SIP—Versatile but Vulnerable By Lisa Phifer -
Published May 28, 2008
As SIP-based VoIP and related communications apps proliferate, IT managers need to know where the chinks in the armor lie. [more Prevention & Risk Management ]
The Stewards of Online Reputation By Lyne Bourque -
Published May 27, 2008
Secure Computing's technology helps you determine your online reputation and make it harder for online criminals to undo years of hard work. [more Prevention & Risk Management ]
DHS Program Helps Reduce Open Source Defects By Sean Michael Kerner -
Published May 20, 2008
Two years into the effort, new report sheds light on how effective your tax dollars have been at improving open source security. [more Information Security Trends ]
Compliance Issues Still Bedevil IT By Richard Adhikari -
Published May 16, 2008
Compliance vendor says fear and confusion rule the roost. [more Prevention & Risk Management ]
Debian, Ubuntu SSH Under Attack By Sean Michael Kerner -
Published May 16, 2008
Flaw in an SSL package has led to an Internet security storm surge. [more Online Threats & Alerts ]
CA: Role-Playing Needs Security Test By Richard Adhikari -
Published May 15, 2008
It's all about the roles when deciding user access to critical data resources. [more Prevention & Risk Management ]
Six Fixes on Tap From Microsoft By Andy Patrizio -
Published May 14, 2008
Patch Tuesday fixes address three critical and one moderate problems. [more Vulnerability & Virus Patches ]
Q&A;: Jules Polonetsky, Chief Privacy Officer, AOL By Kenneth Corbin -
Published May 14, 2008
AOL's top privacy watchdog talks about how online data collection really works, balancing data and consumer privacy, and the government's role. [more Prevention & Risk Management ]
Centralized Security Reporting for Open Source By Sean Michael Kerner -
Published May 12, 2008
oCERT takes shape, but not every big open source vendor is directly involved. [more Prevention & Risk Management ]
Microsoft's Patch Day Targets Four Vulnerabilities By Andy Patrizio -
Published May 12, 2008
Hole in the Jet database considered the most severe, since it affects so many Microsoft and third-party apps. [more Vulnerability & Virus Patches ]
Neocleus Modifies Xen For Endpoint Security By Richard Adhikari -
Published May 9, 2008
But will users go along with multiple desktop operating systems? [more Prevention & Risk Management ]
Receive news via our XML/RSS feed
See more EarthWeb Network feeds
eBook: Evaluating Software as a Service for Your Business. Sponsored by Webroot
Keep up with the latest business and technology news and information! Visit Internet.com.
Stay up to date! Get real-time news and reviews about the latest innovations in internet technology.
14-Day Qualys Trial: Find Out in Minutes if Your Network is Vulnerable!
Thawte Security Whitepaper: Server-Gated Cryptography
IT MANAGEMENT NETWORK NEWS