News

News Archive

  • December 12, 2005 12 Dec'05

    Experts: Encryption not a security cure-all

    Encrypting data offers some protection, but secure applications require much more than cryptography. Experts weigh in on your security options.

  • December 08, 2005 08 Dec'05

    IP cloaking becoming a business necessity

    Just by browsing your competitor's Web site, you might be giving away your company's most guarded secrets. Experts offer advice for countering the subterfuge and keeping secrets safe.

  • December 07, 2005 07 Dec'05

    Security pros gain ground in the board room

    Executives are paying more attention to their IT security managers and taking more responsibility for online threats against their companies, according to a new study.

  • December 06, 2005 06 Dec'05

    Cybersecurity policy takes cooperation, trust, experts say

    At the Infosecurity confab, experts explain why sharing information -- even when it's embarrassing -- is vital to securing not only corporations, but also the national infrastructure.

  • November 30, 2005 30 Nov'05

    Out-of-cycle IE patch may be imminent

    Microsoft may release a critical Internet Explorer fix before the next Patch Tuesday, amid reports that malicious code is targeting a memory corruption flaw.

  • November 29, 2005 29 Nov'05

    By the numbers: The new SOX breakdown

    SOX spending for 2006 is expected to be on par with last year but it's not quite dÉjÀ vu all over again. More dough will go to technology.

  • November 28, 2005 28 Nov'05

    Who owns and administers the internet's addresses?

    Given that IPv4 addresses are a finite resource, we can expect concerns over their distribution to increase in the coming years.

  • November 28, 2005 28 Nov'05

    Step 6: Configuring wireless clients

    With wireless networks proliferating it is a good idea to understand what it takes to build a VPN for a wireless gateway. Contributor and Microsoft MVP Brien Posey details the necessary steps in this step-by-step guide.