July 19, 2002TRENDS | by Sharon Gaudin, July 19, 2002
The man heading up the nation's top research institute on counterterrorism and cyber security says corporate America is vulnerable to attack, and he wants to create a team reminiscent of the Manhattan Project to tackle the problem.
While external attacks are serious enough, the threat posed by one's own employees -- whether intentional or inadvertent -- can often be much worse. But a number of software management tools can help overburdened IT staffs reduce network vulnerabilities.
July 12, 2002TRENDS | by Jacqueline Emigh, July 12, 2002
Intrusion detection systems provide reams of raw data, and plenty of false alarms. How do you assess an IDS, where do you use one, and when does a human need to step in and make sense of what it's telling you?
June 18, 2002TRENDS | by Sharon Gaudin, June 18, 2002
The latest variant on a worm designed to take advantage of a security vulnerability in Microsoft's Internet Explorer collects email addresses from the Windows Address Book and uses its own SMTP engine to send infected messages.