June 27, 2002TRENDS | by Paul Desmond, June 27, 2002
IT professionals are worried about a cyber attack against the U.S. government, with many considering such an attack 'likely' in the next year, according to survey results released this week by the Business Software Alliance.
June 21, 2002TRENDS | by Sharon Gaudin, June 21, 2002
Microsoft is working to quickly retire old, security-weak code in its Windows operating system, but users running current or old versions won't be able to take advantage of it until they buy into upcoming versions.
June 18, 2002TRENDS | by Sharon Gaudin, June 18, 2002
The latest variant on a worm designed to take advantage of a security vulnerability in Microsoft's Internet Explorer collects email addresses from the Windows Address Book and uses its own SMTP engine to send infected messages.
June 06, 2002TRENDS | by Paul Desmond, June 06, 2002
Outsourcing security functions is a viable option for enterprises, but the security service provider market is still maturing, so users must exercise caution and perform due diligence before selecting a provider.
June 05, 2002TRENDS | by Sharon Gaudin, June 05, 2002
Although it hasn't been unleashed on the Internet, a new virus is able to infect both Windows 32 systems and Linux operating systems, making it the first complex virus with cross-platform capabilities.
June 05, 2002VIEWS | by Esther Shein, June 05, 2002
In Part 2 of CIN's interview with the Homeland Security CIO, Steven Cooper discusses strategies and best practices for cyber security and homeland defense, as well as the importance of change management.
(Click here to read Part 1.)
June 03, 2002TRENDS | by Beth Cohen, June 03, 2002
Everyone loves a good security horror story when it's someone else's security that's horrifying. Sticking to some basics can ease your fears about your own network while others swap war stories. First in a series.
May 30, 2002TRENDS | by Sharon Gaudin, May 30, 2002
A new study by a network security company shows that employees misusing their Internet connections on the job are forging a path for spam to flood into their companies' inboxes. But some say that's tantamount to blaming the victim.