Security

Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.

Featured Stories

Articles about Security

What hybrid cloud? It's hybrid IT

What hybrid cloud? It's hybrid IT

The concept of hybrid cloud is evolving into an enterprise IT environment that encompasses multiple cloud models and vendors, providing agility and scalability as well as creating complexity that needs to be managed.

May 10, 2015 by in Cloud

P2P File Sharing Policy

Tech Pro Research's P2P File Sharing Policy can help you provide guidelines for the proper use of P2P file sharing.You can download the policy template and use it as is or modify it to suit your needs.The...

from Tech Pro Research

Microsoft launches its security service

Windows Live OneCare provides a mini-IT department for those who want a managed service to provide virus protection, anti-spyware and firewalls. It is the first of many managed online security services to debut this year. Offerings from Symantec, McAfee and other established security vendors are due out as well.

May 30, 2006 by in Microsoft

How to secure your data

Parts of the corporate network, such as disk drives and servers, can be at risk of intrusion without a proper data protection architecture. Ron Willis of Cipher Optics explains how companies are using this architecture to secure their networks.

May 30, 2006 by in Data Centers

Reporter Roundtable: Lenovo and the China card

Is Lenovo a potential information security risk because of the Chinese government's part ownership in the PC maker? That's what an influential Congressman says, and he forced the U.S. State Department to back down over the issue. Join CNET News.com's Reporter Roundtable with Charles Cooper, Harry Fuller, Tom Krazit and Joris Evers for a behind-the-scenes discussion of what happens next.

May 26, 2006 by in Security

C.R.A.P. that won't go away

Digital Rights Management-- or what ZDNet Executive Editor David Berlind calls C.R.A.P. (Content Restriction Annulment Protection) -- has enabled companies like Apple to lock music downloaded through their service into their own devices. Berlind describes an effort to create a DRM standard so content can flow seamlessly between multiple devices.

May 26, 2006 by in Mobility

Symantec takes on Microsoft

Storage tech is the issue, but CEO Thompson says Symantec isn't afraid of Microsoft in security either. Also, spam fighter surrenders, and a tool to make Web search safe arrives. Join Joris Evers and Robert Vamosi for this week's Security Bites.

May 19, 2006 by in Security

Symantec vs. Microsoft

John Thompson, Symantec CEO, tells CNET News.com's Joris Evers that his company is much more focused on security than Microsoft. The interview took place after Thompson's keynote at Gartner Symposium ITxpo 2006 in San Francisco on May 17.

May 18, 2006 by in Security

What security will cost you

After his keynote at Gartner Symposium ITxpo 2006 in San Francisco on May 17, Thompson spoke with CNET News.com reporter Joris Evers about the price of security software and Microsoft's entry into the security competition.

May 17, 2006 by in Security

AJAX & security

AJAX is a new Web technology being used in sites like Google Maps and MySpace. Like every new technology, it has security risks. Brian Chess of Fortify Software urges developers to be mindful of these threats.

May 8, 2006 by in Security

Open source security

Open-source software developers often rely on the "many eyeballs" theory to ensure security. Brian Chess of Fortify Software says this process is ineffective, and urges users to hold developers accountable.

May 8, 2006 by in Open Source

Most Popular