The HyTrust Appliance is designed to give IT administrators greater control over their virtual environments and ensure greater security and compliance

The HyTrust Appliance is designed to give IT administrators greater control over their virtual environments and ensure greater security and compliance
The government has awarded contracts to CSC and IBM to upgrade biometric passports and other systems that will pave the way for ID Cards
Creating a more efficient and secure way to exchange such medical information will lead to better patient treatment and improved public health, supporters say
If successfully exploited, the PowerPoint bug could enable hackers to take control of the victim's computer
If successfully exploited, the attacks give the hacker complete control over the database server operating system, file system and the rest of the internal network machines.
Wi-Fi has become an essential feature of smartphones, and more apps are using it. But they may not be secure, warns Andrew Garcia
April 1 has come without major trouble from the worm, but users should remain vigilant, apply the existing defences - and beware fake patches
There is a 10 to 20 percent risk of a major failure in communications networks within the next 10 years, according to the European Commission.
Security vendors are taking advantage of a discovery by two members of the Honeynet Project who uncovered a new way to detect the Conficker worm on infected PCs.
Security threats like Conficker, along with the regulations and measures to combat them, are a nightmarish waste of resources, says Peter Judge
A major update is due for Conficker on Wednesday. But should we fear such a well-understood piece of malware?
Psyb0t exposes router and broadband vunerabilities.
Security flaws reported in Google Docs have been described. If Google doesn't take these reports seriously, it will lose the enterprise users it is gaining, says Michael Hickins
Google says that security concerns about its online document service Google Docs are "not significant", despite claims that users can access material to which the author has denied access.
30 percent of SharePoint servers are deployed outside the management of the IT department.
There's plenty you can do to protect yourself against malware. The best precautions are tough policies, common sense and experience, there's no magic off-the-shelf solution.
Why do we still have spam, when we have the tools to eliminate it? Because the spam problem is simply not compelling enough, says Larry Seltzer
IE 8, Firefox and Safari all need to keep boosting security, even though hackers are concentrating on Web applications
A new police e-crime unit will help combat the threat, according to payments industry body
Security researchers have released proof of concept exploit code for an Intel chip flaw that could be abused to compromise computer systems
Security consultants have engineered a worm which can bring down smart grids - while AT&T launches a product and the UK backs the concept
Panda says the updated release is up to 50 percent more efficient than traditional endpoint security
With Adobe releasing further patches and vulnerability updates for Acrobat and Reader, the question has to be asked, is it time to take your business elsewhere and consider the alternatives?
Threats are growing, and companies simply do not have the option to ignore the problem. This will drive a more diverse, service-driven security model, says IBM's Marc Van Zadelhoff
Microsoft to launch open-source security analyser for application developers.
Some features catch up with rival browsers, others add new abilities and security functions. If you are an IE user, you should read our guide, and get to know the new version
Security, ease of use, and improvements in RSS, Cascading Style Sheets and AJAX support are key priorities for Internet Explorer 8, according to Microsoft
If the merger goes ahead, IBM will have to make choices: Which database, which directory, and which virtualisation technology?
While all around are making short term decisions, you have to keep you head, and make sure your long term goals are still in the picture, says Jonathan Steel
Social Networking and Cloud Computing are proving a headache for organisations.