A report on Trojan e-mail attacks against critical infrastructure systems in the U.K. highlights an emerging trend away from mass-mailing worms and viruses to far more targeted ones, analysts said.
Jaikumar Vijayan |
20 Jun |
Read more
Keeping the network safe these days means fixing it before you know what's going to attack it or where. Worms wriggle faster, hackers are quicker, so out-manoeuvring mal-intents means knowing what they're up to before they do it, writes Jaikumar Vijayan
Jaikumar Vijayan |
01 Jun |
Read more
Companies hoping to mitigate their exposure to insider attacks need to ensure they have good password, account and configuration management practices, as well as the right processes in place for disabling network access when employees are terminated.
Jaikumar Vijayan |
23 May |
Read more
Growing fears of identity theft and e-mail phishing scams, exacerbated by the recent data leaks at ChoicePoint and Bank of America, are pushing companies to adopt new IT security tools in a bid to bolster consumer confidence in online transactions.
Jaikumar Vijayan |
08 Mar |
Read more
Security architectures that are designed solely to react to threats instead of preventing them in the first place are doomed to fail in a world of fast-evolving and self-propagating threats, says Tom Noonan, CEO of Internet Security Systems.
Jaikumar Vijayan |
07 Dec |
Read more
As director of corporate security strategy at IBM, Stuart McIrvine is responsible for developing the company's overall road map for IT security products, services and partnerships. McIrvine's job, to which he was named in mid-October, involves managing a team that coordinates security-related initiatives across IBM's hardware, software, services and research groups.
Jaikumar Vijayan |
08 Dec |
Read more
Operational and tactical considerations continue to dominate the IT security agenda, despite a growing need for more strategic approaches to data protection, said attendees at the Computer Security Institute's annual conference in Washington, D.C., this week.
Jaikumar Vijayan |
15 Nov |
Read more
Symantec has outlined an information integrity strategy that users and analysts said addressed a growing need for a more holistic view of the operational and security risks that companies face.
Jaikumar Vijayan |
01 Nov |
Read more
A lack of information sharing and cooperation between IT security, physical security and risk management functions is hindering efforts to upgrade corporate security, according to a study released this week by The Conference Board Inc.
Jaikumar Vijayan |
25 Oct |
Read more
A distributed denial-of-service attack that disrupted Web-based systems at credit card payment processing firm Authorize.Net earlier last week is indicative of a sharp increase in the number of cyberattacks being targeted at specific companies and driven by profit motives on the part of the hackers who launch them.
Jaikumar Vijayan |
27 Sep |
Read more
Dealing with a distributed denial-of-service attack such as the one that took down The SCO Group's Web site last week continues to be a major challenge for companies, security experts said. But several options are available to at least help alleviate the pain for those that become targets.
Jaikumar Vijayan |
09 Feb |
Read more
A knowledge of information security risk management is just one of the many skills that a chief security officer needs for crafting, influencing and directing an effective organizationwide protection strategy.
Jaikumar Vijayan |
15 Dec |
Read more
A knowledge of information security risk management is just one of the many requisite skills a chief security officer needs for crafting, influencing and directing an effective organizationwide protection strategy.
Jaikumar Vijayan |
08 Dec |
Read more
Paul Mockapetris invented the Internet's core Domain Name System (DNS), which is a highly distributed hierarchical database that translates Web names into Internet Protocol addresses, and vice versa. Without it, the Internet as it's structured today wouldn't work. In an interview this week with Computerworld, he talked about the state of the DNS a year after the first distributed denial-of-service attack on the system.
Jaikumar Vijayan |
28 Oct |
Read more
Inadequate funding remains the single largest obstacle to implementing effective IT security measures at most companies, according to the results of a recently completed global survey by Ernst & Young International.
Jaikumar Vijayan |
17 Jul |
Read more