Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.

Featured Stories

Articles about Security

Information security policy

Information security policy

Information is the lifeblood of the business. Without it, employees cannot work, customers cannot interact with the business, bills cannot be paid, and profits cannot be earned. Any given technological...

from Tech Pro Research

Photo: Real deal switches on video

Photo: Real deal switches on video

Jim Ryan, vice president of consumer data services at Cingular, (left) and Rob Glaser, CEO of RealNetworks, (right) talk up the new streaming video service that RealNetworks will offer over Cingular's new 3G mobile network during a keynote speech at the CTIA IT and Entertainment conference in San Francisco on Sept. 28, 2005.

July 19, 2006 by in Security

Microsoft launches its security service

Windows Live OneCare provides a mini-IT department for those who want a managed service to provide virus protection, anti-spyware and firewalls. It is the first of many managed online security services to debut this year. Offerings from Symantec, McAfee and other established security vendors are due out as well.

May 30, 2006 by in Microsoft

How to secure your data

Parts of the corporate network, such as disk drives and servers, can be at risk of intrusion without a proper data protection architecture. Ron Willis of Cipher Optics explains how companies are using this architecture to secure their networks.

May 30, 2006 by in Data Centers

Reporter Roundtable: Lenovo and the China card

Is Lenovo a potential information security risk because of the Chinese government's part ownership in the PC maker? That's what an influential Congressman says, and he forced the U.S. State Department to back down over the issue. Join CNET's Reporter Roundtable with Charles Cooper, Harry Fuller, Tom Krazit and Joris Evers for a behind-the-scenes discussion of what happens next.

May 26, 2006 by in Security

C.R.A.P. that won't go away

Digital Rights Management-- or what ZDNet Executive Editor David Berlind calls C.R.A.P. (Content Restriction Annulment Protection) -- has enabled companies like Apple to lock music downloaded through their service into their own devices. Berlind describes an effort to create a DRM standard so content can flow seamlessly between multiple devices.

May 26, 2006 by in Mobility

Symantec takes on Microsoft

Storage tech is the issue, but CEO Thompson says Symantec isn't afraid of Microsoft in security either. Also, spam fighter surrenders, and a tool to make Web search safe arrives. Join Joris Evers and Robert Vamosi for this week's Security Bites.

May 19, 2006 by in Security

Symantec vs. Microsoft

John Thompson, Symantec CEO, tells CNET's Joris Evers that his company is much more focused on security than Microsoft. The interview took place after Thompson's keynote at Gartner Symposium ITxpo 2006 in San Francisco on May 17.

May 18, 2006 by in Security

What security will cost you

After his keynote at Gartner Symposium ITxpo 2006 in San Francisco on May 17, Thompson spoke with CNET reporter Joris Evers about the price of security software and Microsoft's entry into the security competition.

May 17, 2006 by in Security

AJAX & security

AJAX is a new Web technology being used in sites like Google Maps and MySpace. Like every new technology, it has security risks. Brian Chess of Fortify Software urges developers to be mindful of these threats.

May 8, 2006 by in Security

Open source security

Open-source software developers often rely on the "many eyeballs" theory to ensure security. Brian Chess of Fortify Software says this process is ineffective, and urges users to hold developers accountable.

May 8, 2006 by in Open Source

Most Popular