CARVIEW |
- Feature
Exclusive review: HP BladeSystem Matrix
HP's state-of-the-art blade server system and array of automation tools haven't squeezed all manual labor out of service provisioning, but they show the automated and adaptive datacenter is within reach more
Microsoft confirms attacks against IE6, IE7
'Browse-and-own' bug lets hackers hijack Windows XP; temporary fix is available
Hackers exploit second DirectShow zero-day using thousands of hijacked sites
A new unpatched Windows bug surfaces; Windows 2000, XP, and Server 2003 are all vulnerable
Twitter falls under a gorilla attack
Twitter is increasingly the medium of choice for PR pros and pranksters alike. Can it survive the onslaught of attacks from flacks and hacks?
The 10 dumbest mistakes network managers make
Verizon Business analyzed 90 security breaches and found they were often the result of network managers forgetting to take these obvious steps
RSA: Cloud computing not secure enough
Q&A;: Art Coviello says the good news is that these are early days for cloud computing and security can be improved

Good security in recessionary times
A rough economy can be a good opportunity for your company to pay attention to the basics of IT security. Getting the essentials... more
Configuration Assessment: Choosing the...
Configuration assessment lets businesses proactively secure their IT infrastructure and achieve compliance with important... more
Let your worst fears be your guide
Your computer security defense should be built with the assumption that all attackers are trusted, highly privileged insiders... more






Blog by Roger A. Grimes
Unless you solve the all-important problem of locking down end-user PCs, all of your other security defenses will fail you

Sign up to receive InfoWorld Resource Alerts
Subscribe to the Security Central Newsletter
The one-stop resource center for IT professionals.



White Paper
CA Security Management Solutions
A comprehensive security management solution can help you streamline, as well as grow, your current or evolving business. In this way, a strategic security approach can help you increase your competitiveness in these challenging market conditions.
Download now! »
White paper
Beyond Compliance: The Significant Benefits of Log Management
Find out how you can effectively collect, normalize and archive enterprise-wide, security-related data that is invaluable for security investigation and compliance reporting.
Download now! »
Webcast
Integrated Identity Compliance: Enabling Cost-Effective Role-Based Compliance
This session focuses on the intersection of role management and identity compliance, and addresses the importance of identity compliance in enterprise governance and the challenges that organizations may face in achieving it.
View now! »
Antispyware Software
High performance Antispyware software from Sunbelt Software |