Security: Access


Are Financial Industry Security Administrators Losing the War?

In the online banking segment, some industry watchers warn, the bad guys are winning the war against unsuspecting account holders.

Q&A: Staying Ahead of Network Security Issues

Where should IT focus its attention in protecting network assets, what investments offer the best return, and how can IT to avoid common mistakes when developing its security strategy?

People and Processes Key to Faster SIEM ROI, Secure Business

These five best practices will help deliver success more rapidly and ensure increasing return on investment.

Stephen Swoyer

Enterprises Throw Out Wi-Fi Welcome Mat to Attackers, Study Finds

A recent report by AirTight Networks finds financial services firms are all but throwing out a welcome mat to wireless attacker

Stephen Swoyer

Spammers Exploiting the Recession

Spammers are tweaking their messaging to better exploit recession-related fear, uncertainty, and doubt

Removing Admin Rights Dramatically Cuts Vulnerabilities, Study Finds

One of the biggest threats facing your organization is already installed on your desktops: admin rights for end users

Q&A: Best Practices for Access Management

We look at the purpose and best use of groups and roles.



Minding the Gap: Security Vendors Look to Plug Holes in Suite Offerings

Security vendors are stepping up their efforts to close the gap between security and operations

Microsoft Pulls the Plug on Windows Live OneCare

Microsoft's decision to exit the consumer security space reflects a fundamental shift in the market.

The Year in Security and the Fresh Problems Ahead

All things considered, 2008 was a quiet but industrious year on the security front.

Survey Highlights Threats from Disgruntled Employees

Employees who believe they may be fired may steal proprietary information to blackmail management

IT's Security Dilemma: To Patch or Not to Patch

An out-of-band security fix from Microsoft put administrators in a familiar but tough spot: potentially damned if they patched and damned if they didn't.

Most Enterprises Unprotected Against E-mail Security Risks, Study Finds

Only 10 percent of organizations are actually using effective anti-spam technologies

Q&A: Securing Your Endpoints

Endpoints pose security risks to an enterprise, but identifying those endpoints can be IT's biggest challenge.

Q&A: Managing Active Directory

Best practices for managing groups in Active Directory.

Managing Security Compliance from the Inside Out

Why automated security policy management should be part of IT's overall data security compliance strategy.

McAfee's Secure Computing Acquisition: The View from Gartner

McAfee's acquisition of Secure Computing could trigger a round of consolidation and disrupt the security status quo for vendors and customers alike

Breaking Biometrics Barriers in the Enterprise

Why biometrics haven't been adopted faster

Survey Sheds Light on Use, Maintenance of Network Access Control

A new survey shows that enterprise networking groups -- not IT security pros -- are usually responsible for day-to-day NAC administration.

Disgruntled Employees Pose Large Inside Threat

A new survey finds that nearly 9 out of 10 IT employees say they'd steal privileged or confidential information if they knew they were going to be laid-off tomorrow.