Ads by TechWords

See your link here


Subscribe to our e-mail newsletters
For more info on a specific newsletter, click the title. Details will be displayed in a new window.
Infrastructure & Control
Finance
Security
Computerworld Daily News (First Look and Wrap-Up)
Computerworld Blogs Newsletter
The Weekly Top 10
More E-Mail Newsletters 
Computerworld 2007Subscribe to Computerworld
40 years of the most authoritative source of news and information for IT leaders.
Server Security
Meet Windows Server 2008. The server unleashed.

Microsoft's CardSpace attacked by researchers
Identity theft predates the Internet, and if even the best-laid plans for combating it are destined to go astray, there's bound to be crime aplenty ahead. According to researchers who have examined Microsoft's CardSpace system, that particular plan diminishes risk -- but could never eliminate it. Read more...

Gartner: Be cautious about letting new iPhones into your company

Cisco PIX security users get green trade-in offer

Microsoft hits 21 U.S. resellers with piracy lawsuits

Microsoft releases public beta of identity management server

Security vendors roll out full-disk encryption support for Macs

Tandberg touts superfast mini tape library

Symantec tool cleans up XP SP3 registry corruption

Symantec tells users: Disable protection before XP SP3 upgrade

Speed is of essence for next-generation Symantec products

More Security Hardware and Software StoriesMore Top Stories

10 essential (and free!) security downloads for Windows
Security and privacy protection doesn't have to cost a lot — or indeed anything at all. These 10 great freebies will keep you safe from prying eyes and bad guys.

Review: Satellite notebook protects itself with faces instead of fingerprints
Toshiba's latest Satellite notebooks offer face recognition software, but the technology may not yet be ready for prime time.

Opinion: Where are those infosec jobs?
Those news reports of vastly increased information security spending just around the corner may sound awfully cheerful, but Jon Espenschied detects some lazy -- or is it wishful? -- thinking.

Review: PC Tools ThreatFire 3.5 antivirus software
Now in version 3.5, this free utility adds an extra layer of protection to the security software you already have. It blocks an impressive number of threats through behavior-based analysis.

ZoneAlarm ForceField: Two defenses are better than one
Check Point Software's ZoneAlarm ForceField provides an extra defensive layer by cloning your Web browser to catch dangerous software before any damage can be done.

Q&A;: Schneier says cybercrime problem 'might not be fixable'
Bruce Schneier, CTO at managed security services vendor BT Counterpane, said in an interview that making things harder on cybercrooks may require actions that financial services firms won't like.

The future of antivirus
Does malware exist only because antivirus products are around to combat it? It's a provocative thought. CSO's Michael Fitzgerald looks at the state of the AV art these days, asks the experts if there's any way out of the malware arms race, and finds hope at an unlikely source.

Free and cheap software that outdoes the big guys
Here are 15 mostly free applications that can credibly replace big-bucks PC software.

Review: 7 secure USB drives
With almost daily stories about data loss or breaches in the press, Computerworld decided to review seven USB drives from top vendors, based mostly on security and ease of use. We looked at everything from a drive built to military specifications, to one that even hides your Web searches.

Services tap people power to spot malware
People-driven security, which uses the wisdom of crowds to identify new malware, spam and similar threats, is starting to gather momentum as users take to the community-service nature of the endeavor.

Intel's x86 microprocessor architecture has dominated large swaths of computing for three decades. Here's why.
The notebook we use in five years might look a lot like the XO 2.0 clamshell, a prototype of the next version of the OLPC laptop.
Apple's splash into the cell phone market proved consumers will pay for hip devices. Now the race is on to one-up the iPhone.
NASA engineers and programmers are writing code each day to send to Mars to control the Mars Lander, which is gathering and testing soil on the surface of the planet.
Reviews, analyses, how-tos, visual tours, hot issues and predictions about Microsoft's new OS.
Four years from now, the IT field will be a vastly different place. Will you be ready?
The New Foundation of Storage: Xiotech's Intelligent Storage Element
(Source: Xiotech) The underlying elements of data storage remain more or less the same and have been unable to keep pace with changing business requirements. Xiotech offers a fresh approach with its Intelligent Storage Element: A storage foundation that sets new standards for reliability, performance, and scalability.
More White Papers More White Papers
Featured Zone
Software Zone

Security management is the process of developing a comprehensive data protection plan. It takes into account all potential threats, the existing network environment, the future needs of the organization, and lays out a multi-tiered blueprint to integrate the security technology needed to combat these threats. CDW can help keep your network and data secure.

Client Security Podcast
CDW Security Profiler
Network Security Reference Guide
Visit the CDW Security Management Zone now
E-mail Address:
(Required)
 Security
 Networking Security
 Virus and Vulnerability Roundup
 Security: Issues and Trends
 Infrastructure & Control
"You know if I was traveling to the Olympics this summer, I'd have my laptop in tow. While I'm not..." Read more Read More Blogs

"Some day soon, you may go in and turn on your Windows PC and find your most valuable files locked..." Read more Read More Blogs

"Apple's Windows version of Safari has a very big security hole, and Windows users are more vulnerable than ever, because..." Read more Read More Blogs

More Security Blogs More Security Blogs
See all Computerworld Blogs See all Computerworld Blogs
Trial Download
Free MessageLabs Trial

The business risks from email and web use are widespread. But what's the reality of the situation for your business? Complete the short form to find out with a FREE MessageLabs Trial.

During the trial, we will monitor all your inbound and outbound email and web traffic and provide you with a complete picture of the risks facing your business every day.

Register for this trial now.  
Featured Column
In SecurityIn Security
Those news reports of vastly increased information security spending just around the corner may sound awfully cheerful, but our columnist detects some lazy -- or is it wishful? -- thinking.

Click here to read the latest column by Jon Espenschied
Long Tail Supplier Collaboration - What's In It For You?
Long Tail Supplier Collaboration - What's In It For You?
Download this webcast, free, compliments of Sterling Commerce
Go to the webcast 
Computerworld Executive Bulletin: Building a Robust Antivirus Defense
Download this Executive Bulletin (a $49.95 value) for free, compliments of MessageLabs.
(Source: MessageLabs) Antivirus software alone isn't enough to prevent today's speedy, sophisticated virus attacks. Security managers should consider multitiered approaches that include behavior scanning, appliances that check e-mail for worms, and restricting user access to dangerous Web sites. Download this Executive Bulletin (a $49.95 value) for free, compliments of MessageLabs, to learn more.
Download this executive briefing download
Data Loss Prevention Best Practices
Get this white paper now!
(Source: Ironport) Data loss prevention (DLP) is a serious issue for companies, as the number of incidents (and the cost to those experiencing them) continues to increase. Whether it's a malicious attempt, or an inadvertent mistake, data loss can diminish a company's brand, reduce shareholder value, and damage the company's goodwill and reputation.
Download this white paper go
White Papers
Read up on the latest ideas and technologies from companies that sell hardware, software and services.
Discover the Secret to Secure Remote Access: GoToMyPC Corporate Security White Paper
Six Support Issues That Keep Execs Awake at Night
Securing your Online Data Transfer with SSL
View more whitepapers 
Premier 100
For more information or to register, please visit premier100.com.

Storage Networking World (SNW)
For more information or to register, please visit snwusa.com.

Mobile & Wireless World (MWW)
For more information or to register, please visit mwwusa.com.

Infrastructure Management World (IMW)
For more information or to register, please visit imworldusa.com.

Business Intelligence Perspectives
For more information or to register, please visit biperspectives.com.

IT Executive Summits
For more information or to register, please visit itexecutivesummit.com.
See all events see all events
Layered Security Solutions
Although basic network security issues have changed very little over the past decade, the network security landscape has changed dramatically. Today's IT professionals still have the primary responsibility of protecting the confidentiality of corporate information, preventing unauthorized access, and defending the network against attacks. Security experts and analysts agree that a security solution comprised of multiple layers is the best defense against today's increasingly sophisticated attacks.

Download this white paper 
Universal Threat Management - Because Conventional UTM is Not Enough!
This white paper, written by Mark Bouchard of Missing Link Security Services, examines the challenges confronting today's enterprises with respect to managing threats on a network. It also discusses the need for "Universal Threat Management", which is a security solution approach for all physical locations within an enterprise that require threat protection.

Download this white paper 
Selecting the Right Threat Management Solution
This short demo will guide you through key considerations for selecting a solution to manage threats on a network. Learn about the popularity of Unified Threat Management (UTM), and how it fits into an overall security solution. Explore critical elements of a network-wide solution for multisite and large network-size deployments and identify the four key features of a threat management solution.

View this demo