Canadian university boosts network security with “discerning” software

Handling network security for a university can be a nightmare for  administrators. One reason for this is the difficulty in distinguishing actual risks from the tens of thousands of network incidents spawned by

Published on: March 23rd, 2009 Nestor Arellano

Hackers compromise thousands of Web sites

Several criminal gangs have acquired administrative log-in credentials for more than 200,000 Web sites -- including the one used by the U.S. Postal Service -- and have used the compromised domains to attack

Published on: October 6th, 2008 Gregg Keizer

US gov’t focuses on cybersecurity backdoor defences

As part of a comprehensive cybersecurity push, the U.S. government will focus on improving its network defense capabilities and on revamping acquisition rules to protect against malicious code installed during the manufacturing process

Published on: September 16th, 2008 Grant Gross

Success of new hacker strategy points to holes in payment card security standards

Security managers often describe their efforts to protect corporate data from being compromised as a full-fledged battle of wits against cybercrooks who are continually arming themselves with innovative tools and methods of attack.And

Published on: April 16th, 2008 Jaikumar Vijayan

Top 10 security threats to your business network

There are lots of ways business networks can be compromised, and more are developing all the time.They range from technology exploits to social engineering attacks, and all can compromise corporate data, reputation and

Published on: April 10th, 2008 Tim Greene

Canadian Newspaper Association’s servers hacked

When a few dozen journalists gathered in Toronto last September for a one-day professional development seminar, they didn't expect the event on topics like interviewing and filing freedom of information requests to result

Published on: January 25th, 2008 Grant Buckler

Internet filters almost useless without strong policies

No matter how advanced the technology behind them is, Internet filters are no substitute for diligently followed security policies, according to IT insiders. "There's no substitute for policies and ethics. You need to

Published on: November 15th, 2007 Nestor Arellano

Data loss-prevention efforts stymied by poor processes

Protecting corporate data entails more than securing the perimeter; it requires that companies identify the data to be secured and explicitly define with processes how to prevent leaks. And according to a recent

Published on: November 14th, 2007 Denise Dubie