CA: Role-Playing Needs Security Test

Microsoft Patch Tuesday: May 2008
A patch affecting Microsoft's own anti-malware software is among this month's releases.
Which is More Secure, Leopard or Vista?
A security expert revisits an earlier examination he made of the relative security of Mac Tiger and Windows XP.
CDW: Telework Taking Off
A report from the IT products reseller and services provider paints a picture of a business climate that's coming to terms with telecommuting. Security concerns still loom, however.
Is PCI-SSC Securing the Enterprise or Lining Pockets?
Devised as a way to extend security and lend confidence to the payment card services industry, PCI standards are hardly deterring crafty crooks and merchants are paying the price.
Flickr Taking Privacy Just Casually Enough
People will give up a little privacy to enrich their worlds.
No XP Service Pack 3 for You Today
Microsoft ran into compatibility issues with Windows XP customers who also run Microsoft's Dynamics RMS, a software package for running retail stores.
Half-Million IIS Servers Hit in Cyber Attack
Exploit redirects visits of what appear to be a harmless site to one that downloads malware onto their computer.
Begging to be Spammed
As part of a month-long experiment, McAfee challenged 50 volunteers to generate as much spam as they could. To no one's surprise, it's easy going.
March of The Trojans
450 million users report that Trojans Horse attacks are increasing. Should we be afraid?
Four Sure IDS Choices
You have to do intrusion detection right, but it seems like the more you know, the harder it gets. Here are four options for Linux and Unix that make it a little less daunting.
Security Topics
Security Advisors
Advice and opinion from security experts on threats and trends.
Anti-Spam Products
Regular updates on the latest in anti-spam software.
Information Security Trends
Reports on the latests trends affecting the security within corporate computing environments.
Intrusion/Detection Products
Briefings on the latest products for monitoring network intruders.
Security News
eSecurityPlanet reports daily on news affecting security with corporate computing environments.
Glossary
A comprehensive dictionary of computer security terms, kept up to date with frequent updates.
Security Discussion
An interactive community discussion forum for sharing insight into threats and solutions.
Rare Occurrence: For a limited time buy Crystal ReportsĀ® XI for $395. Upgrade price $99. Try or Buy>>
Intel Whitepaper: Improve Security and Control of Your PCs
Intel Whitepaper: Wireless Technologies and e-Learning--Bridging the Digital Divide
Intel Whitepaper: Comparing Multi-Core Processors for Server Virtualization
Enhance your Web site with the Dynamic HTML HierMenus Code
eBook: Evaluating Software as a Service for Your Business
Sponsored by Webroot
eBook: Generate Revenue Through IT Using Business Service Management
Sponsored by HP
On-Demand Webcast: Five Virtualization Trends to Watch
Produced for Sponsored by HP, Citrix, and Intel
Whitepaper: Storage Management Costs in the Enterprise--A Comparison of Mid-Range Array Solutions
Sponsored by HP
Article: Managing Your Windows Infrastructure with Microsoft System Center
Sponsored by Microsoft
RIA Article: Get Going with Silverlight and Windows Live
Sponsored by Microsoft
Whitepaper: Tackle the Java Developer Challenge
Sponsored by Actuate
Article: Managing Multi-Core Projects--Multi-Core Development in the Enterprise
Sponsored by Intel
Whitepaper: Enterprising with SIP--A Technology Overview
Sponsored by Avaya
Networking
| Sponsored Resources Click here to view more sponsored resources | ||
Developer Kit: Web 2.0 Learn how to leverage ideas and better enable collaboration in your organization using Web 2.0 technologies such as blogs, wikis, and social bookmarking, Find out how Lotus software brings social networking to the enterprise in this Lotus Web 2.0 Developer kit that includes podcasts, articles, demos, and Web casts. |
Video: Is Your Data Center Ready for a Real World Disaster? Watch as HP simulates a gas leak using real explosives to blow up a data center at a high-tech ballistics center. Every system failed-over after the explosion in less than two minutes including data on an HP StorageWorks XP12000 Disk Array, which failed over flawlessly to an HP StorageWorks XP24000 Disk Array. You don't want to miss this. |
Whitepaper: Converging System and Data Protection for Complete Disaster Recovery An essential part of a backup and recovery solution is granular data protection. Learn about the balanced approach Symantec offers for information availability and security in which data and systems are protected, yet remain accessible wherever, whenever, and to whomever your business needs dictate. |