Endpoint Security

Endpoint security news, solutions, and analysis for IT professionals
  • Hackers looking hard for anti-virus software vulnerabilities

    Posted July 29, 2005 - 12:31 am

    Two security researchers used the Black Hat conference to outline a number of flaws in anti-virus software products that they found by using binary auditing tools.
  • Businesses deploy ID-management software

    Posted May 13, 2005 - 2:14 pm

    Security-conscious businesses will spend a total of $528.4 million on ID- and access-management systems this year, and spending will top $1 billion by 2009, according to research from IDC. This article looks at three companies that have already taken the plunge.
  • Expert: Better ID checks won't beat fraud

    Posted March 16, 2005 - 3:13 am

    The use of two-factor identification is not likely to resolve the identity theft problem faced by online merchants and database companies, an encryption expert has warned.
  • Advantage: Symantec and McAfee

    Posted March 2, 2005 - 1:42 pm

    The speed with which anti-virus vendors McAfee and Symantec reacted to a series of attacks designed to exploit their processes for issuing anti-virus updates demonstrates that they're more nimble than they often get credit for.
  • Fortifying your network-access control: Strong authentication

    Posted February 4, 2005 - 8:13 am

    Single sign-on and multi-factor authentication techniques are rapidly replacing the ubiquitous user-ID-and-password approach to network security. This article takes an in-depth look at the myriad alternatives, the costs and ROI, and where authentication trends are headed.
  • The mobile virus threat: Are security companies fixing a problem that doesn't exist?

    Posted February 2, 2005 - 5:46 pm

    With the advent of the first mobile worms and viruses, security companies are rushing out protection products for smartphones. But is the problem these products addressing real?
  • Securing your Starbucks experience

    Posted January 24, 2005 - 12:02 pm

    Columnist Wayne Rash offers advice on how to avoid security breaches when using your laptop at a WiFi hotspot -- like the local Starbucks. First and foremost, always assume the hotspot is completely open and unsecured.
  • RFID: What to watch in 2005

    Posted January 3, 2005 - 11:51 am

    An aggressive push by Wal-Mart to implement RFID tags as a critical part of its supply-chain management strategy, and the drive to replace the ubiquitous bar code standard with the new Electronic Product Code (EPC) - carried by RFID tags embedded in merchandise packaging - made radio-frequency identification one the major technology stories of 2004.
  • Supply chain: RFID special report

    Posted December 22, 2004 - 8:25 am

    Computerworld takes an in-depth look at RFID, ranging from what you need to know for an RFID pilot to an analysis of the reliability issues. A case study of how RFID is transforming the supply chain at Gillette shows that Wal-Mart isn't the only RFID game in town.
  • RFID skills shortage predicted

    Posted December 21, 2004 - 5:35 pm

    Companies that are moving ahead with RFID implementations will likely face a shortage of IT professionals with the requisite know-how to carry out the mission. The Computing Technology Industry Association (CompTIA) has teamed up with the Association for Automatic Identification and Mobility to develop a certification program for RFID skills.
  • The inside story on RFID tags

    Posted December 21, 2004 - 5:30 pm

    This in-depth overview of RFID technology looks at the differences between active and passive tags, how they work, and the types of applications -- from retail inventory management to personal tracking -- that are stirring the debate over consumer privacy and security.
  • Guarding the grid

    Posted November 30, 2004 - 11:06 am

    "The same tools and technologies that are used today to secure storage, computing and network resources all apply in a grid architecture," says Lee Cooper, chairman of the Enterprise Grid Alliance. The difference is that shared resources and wider access amplify security risks.
  • Managing the mobile workforce

    Posted November 29, 2004 - 3:23 pm

    Handhelds and laptops are everywhere in the work world. CIOs need to be aware of the security risks they create.
  • Telephony troubles

    Posted November 16, 2004 - 10:50 am

    Spam data-clog servers and often carry viruses that can shut down a firm's IT infrastructure. Next up: spam over enterprises' Internet-based phone lines.
  • Strong authentication a hard sell for banks

    Posted November 3, 2004 - 10:52 am

    Despite the surge in online scams, most banks still rely on user names, passwords, and 128 bit SSL encryption. But U.S. Bancorp's recent deal with VeriSign could signal a trend toward greater security for retail banking and brokerage customers.
  • Gartner sees growing need for wireless security policies

    Posted June 14, 2004 - 2:04 pm

    Escalating use of wireless technology means it
  • Can Symantec keep cooking?

    Posted April 26, 2004 - 9:39 am

    The company
  • Network Associates restructuring reflects changing security market

    Posted April 26, 2004 - 8:46 am

    The company has announced that it will sell the Sniffer line of network management tools in order to focus on its network security business. The company will also officially change its name to McAfee, its security product brand.
  • Mydoom, Bagle deliver double blow in January

    Posted February 5, 2004 - 10:39 am

    An at a glance view of the of the monthly lists of words/viruses from the leading security vendors.
  • As security concerns ease, businesses warm to Wi-Fi

    Posted February 2, 2004 - 11:02 am

    As wireless security measures improve, the WLAN security problem is becoming more and more a public relations issue - one that techies are starting to overcome with their bosses.
  • IP VPN: Compelling savings

    Posted November 12, 2003 - 12:03 pm

    Is the cheaper, more flexible VPN approach sacrificing security? That doesn
  • Hack-proofing Oracle9iAS

    Posted October 14, 2003 - 2:50 pm

    This article focuses on securing an Oracle application server - but its points are relevant to anyone trying to keep intruders out of a network. Of particular interest in the section on how an attacker would plan an attack.
  • How Mugsy plans a cyber-heist

    Posted October 14, 2003 - 2:45 pm

    The criminals in old gangster movies always prepare for their heists by "casing the joint," and any computer attacker will do the same. This article outlines what your network will look like to an outside attacker - and how you can narrow your vulnerable profile.
  • Google: Net hacker tool du jour

    Posted October 14, 2003 - 12:55 pm

    You probably already know that Google can help you find information about just about any topic you want to research. But did you know that it can help attackers find weak spots in your network infrastructure? The Web search tool has so many servers cataloged that it reveals forgotten and vulnerable outliers in corporate networks - which means that you have to be extra vigilant about the machines under your control.
  • Recent outbreaks show evolution of virus writers

    Posted September 2, 2003 - 11:08 pm

    The recent Sobig.F virus wasn't just unsettling because of the damage it did; according to experts, it showed a sophistication that heralds a frightening new era of e-mail viruses. Find out more about what the coming weeks and months hold.
Join us:






Join today!

See more content
Ask a Question