(Go: >> BACK << -|- >> HOME <<)


Ads by TechWords

See your link here
Subscribe to our e-mail newsletters
For more info on a specific newsletter, click the title. Details will be displayed in a new window.
Infrastructure & Control
Finance
Security
Computerworld Daily News (First Look and Wrap-Up)
Computerworld Blogs Newsletter
The Weekly Top 10
More E-Mail Newsletters 
 
Network Management Software
Leading Network Management Software Solutions from NetQoS
Security Camera System
Video Security Products Superstore-Name Brands Wholesale to the Public

Security software scammers riding on Conficker's coattails
Google search results related to the Conficker worm are being infiltrated by links to fake security software that purports to remove the malware but doesn't, according to security researchers. Read more...

Microsoft updates WGA to hunt down counterfeit Windows XP Pro

Cisco security updates squash router bugs

In poor economy, IT pros could turn to e-crime

Global Dispatches

Bad Symantec update leads to trouble

Microsoft patches Windows DNS, kernel flaws

Befuddled companies get checklist for complying with PCI security standard

Obama's Blackberry plight prompts interest in mobile voice encryption

Windows security patches coming next week

More Security Hardware and Software StoriesMore Top Stories

Do I own my machine?
The built-in Webcam light is on. It shouldn't be on. I'm not using any recording, video-conferencing or photo applications. Why is it on? Is someone watching me? It's at times like this I get the eerie feeling that I don't actually, fully and completely own my machine. Turns out it was a driver problem, all fixed now. But I still can't shake that feeling.

Security more important than ever in tough times
John Martinicky, director of global security at Navistar International, spoke with CSO about how security has evolved over the years, and why it is more important now than ever before.

Geer: Risk Management Should Change the Future
Dan Geer, formerly president and chief scientist at Verdasys, played a critical role in Project Athena at MIT and was fired from @Stake for co-writing a paper warning that a Microsoft monoculture threatened national security. He recently explained why, despite all he has accomplished in his past, his sights are still set on the future of security.

Avoiding Pitfalls in Log Management Planning
Over the past decade cyber security has emerged as an important concern for organizations of all sizes. The increase in digitized corporate records, coupled with the rise in cyber crime, is driving organizations in the public and private sectors to invest in more protection for sensitive data and regulated or other critical assets. In just the first two months this year, the Privacy Rights Clearinghouse has noted data breaches at several financial, healthcare and educational institutions as well at federal, state and local governmental agencies.

Compass Awards: Robert Rodriguez
Robert Rodriguez, a 2009 CSO Compass Award winner, spoke with CSO about the difficulties small, private security companies face when trying to win grants from the government and how the economy is affecting the Security Innovation Network's efforts to give unknown firms a shot at success.

Cancilla: Security Must Put Business First
In three years, CSO Russ Cancilla has transformed the security operations at oilfield services provider Baker Hughes from one that was fragmented to one with a converged approach. Cancilla, recently named a CSO Compass Award winner, gives us the details of why the new program not only secures the business, but also enables it.

Pethia: InfoSec's Challenges, Changes
Rich Pethia, a CSO Compass Award winner, spoke with CSO about how much IT security and vulnerabilities have changed in two decades.

Fleury: Insider threat is the 'weakest link'
Lynda Fleury, who has almost three decades of experience in information security and is CISO at insurer Unum, sat down with senior editor Joan Goodchild to discuss the challenges facing information security today.

How To Choose an Online Backup Provider
Online backup makes a lot of sense: It gives you off-site peace of mind and the security that comes from knowing that someone else is keeping your data safe and sound. The trouble is that, while there are dozens of individual service providers, there are just a few designed for enterprises and small businesses.

The convergence of SIEM and log management
Though Security Information and Event Management and log management tools have been complementary for years, the technologies are expected to merge. Here's a look at what you can expect in second-generation log management and SIEM solutions.

Apple's all-in-one iMac hits the sweet spot of style and performance -- and the stunning 24-in. model starts at $300 less than before.
Think of a souped-up smartphone with innovative interfaces, from which you can access everything from anywhere (see MIT Media Lab video).
Microsoft's IE8 browser offers cool features, better security, and improved performance. But is that enough to win users back from Firefox?
Apple rumor predicts netbook. Lenovo 'leaks' old prototype. Coincidence?
Get the latest news, reviews and more about Microsoft's newest desktop operating system.
Find wage data for 50 IT job titles.
Embracing Next-Generation Mobile Platforms to Solve Business Problems
(Source: Sybase) In this White Paper, IDC analyzes the role of next-generation mobile enterprise platforms as organizations seek a more strategic deployment of mobile solutions. Understand why mobility is important to enterprise customers; discusses key past obstacles across technology, supplier deployment, and customer adoption; and identifies vital criteria for choosing a next-generation platform.
More White Papers More White Papers
Sign up now for complimentary access to these upcoming Computerworld webcasts.
Featured Zone
Security and Compliance Zone

If you are faced with the complexity of meeting stringent privacy policies and continually changing government requirements, the new Novell® Compliance Management Platform will provide welcome relief. Only the Novell Compliance Management Platform integrates identity, access, and security information and event management technology to provide a real-time, holistic view of all network events across an enterprise. This tight integration eases implementation while creating the ultimate governance solution; ensuring business policy becomes automated IT practice.


Identity and Security Management and Strong Information Technology Governance: Novell's Solution Suite Automates the Approach to the Perfect Union

This IDC White Paper examines Novell's identity and security management (ISM) solutions and how these integrated offerings can play a key role in enforcing security compliance for enterprise organizations.

Success Story: New York City Transit

One of the top priorities of New York City Transit is to ensure that its employees have secure and timely access to information. With a Novell® solution, the agency has automated identity management for 85,000 users, giving 49,000 employees secure, single sign-on to applications and providing 36,000 retirees with online access to benefit information.

Balancing Security Against Productivity

What makes for great security? Is it about keeping the bad guys out or letting the good guys in? About detecting attacks or preventing them? Security is a balancing act of all three of these and requires a holistic, integrated approach. All three disciplines must interact automatically and seamlessly to ensure an effective level of service that enables good business.

View Entire Zone
E-mail Address:
(Required)
 Security
 Networking Security
 Virus and Vulnerability Roundup
 Security: Issues and Trends
 Infrastructure & Control
"There is no doubt that conferences can be fun. But if your employer sends you to a conference, what are..." Read more Read More Blogs

"Worried about Conficker? You don't have to be. There's a software patch that will get rid of all your Conficker..." Read more Read More Blogs

More Security Blogs More Security Blogs
See all Computerworld Blogs See all Computerworld Blogs
White Papers
Comprehensive Backup and Recovery of VMware Virtual Infrastructure
No longer is it enough to protect the data located in a single physical machine. In fact, protecting data created and utilized in virtual machines is not an option, but a business requirement. Introducing Backup Exec 12.5 - Protect your VMware environment with the solution of choice for thousands of IT administrators for more than 15 years.
Download this white paper today! 
TODAY'S TOP BLOG
Seth Weintraub Lisa Hoover Steven J. Vaughan-Nichols Mike Elgan Richi Jennings Mark Everett Hall

Linux, Apple, Microsoft, SaaS, Web 2.0, Security, Mobile.
If it's tech, it's in our blogs.

Premier 100
For more information or to register, please visit premier100.com.

Storage Networking World (SNW)
For more information or to register, please visit snwusa.com.

Business Intelligence Perspectives
For more information or to register, please visit biperspectives.com.

IT Executive Summits
For more information or to register, please visit itexecutivesummit.com.
See all events see all events

Symantec Report on the Underground Economy
The Symantec Report on the Underground Economy examines activity on underground economy servers observed by Symantec between July 1st, 2007 and June 30th, 2008. It includes analysis and discussion of the goods and services advertised, advertisers participating in the economy, the servers and channels that host the trading, and a snapshot of piracy activity observed.
Download this white paper 
Tolly Report: Symantec Endpoint Protection 11.0.3
Symantec's Endpoint Protection 11.0 provides faster processing for common functions such as opening and saving Word and PowerPoint files. This ability can improve the productivity and quality of experience for users. Find out how Symantec outperforms the competition, download the report now.
Download this white paper 
3 Steps to Protect Confidential Data on Laptops
Learn how to avoid being part of the one-third of security breaches that occur due to laptop theft. This report outlines specific steps to help you secure confidential data and minimize the impact of data loss resulting from stolen or missing laptops.
Download this white paper 
The Endpoint Challenge
Take the Endpoint Challenge and discover how your endpoint security solution compares to the protection your business needs
Take the Challenge