Will it be "same old, same old" in security for 2008?
A new report from the IT Policy Compliance Group examined leaders and laggards to identify core competencies and steps to improve data protection.
Industry standards and trusted hardware keep out unauthorized users and equipment
New versions more about people than features.
IPLocks takes a double play on securing databases. One analyst advises you look at your needs or you’ll strike out.
Security isn’t a current stumbling block for Oracle 11g and Applications Security Inc. represents a breed plugging database security gaps
Despite the security weaknesses of FTP, there are several approaches IT can take to use the protocol safely.
Why database-auditing software is critical to protecting your company’s assets
If you have an AS/400 or iSeries, PowerTech Group wants you to update your security model—and a recent study suggests you should pay close attention
Network access control—or entitlement control, as Securent calls it—is all about authentication, access, and authorization.
Antivirus/antispyware package get upgrades while small and mid-size businesses get backup and migration tools
Vanguard wants the mainframe to be the center of security
Versions offers more management, more integration, and more compliance
While a NAC solution blocks infected endpoints from entering the network, what happens when a connected PC becomes non-compliant?
Microsoft doesn’t put enough edge into its security products, yet.
In the second of our two-part series, Michigan’s CISO discusses planning for pandemics and other natural (and even man-made) disasters.
PGP Corporation may have the handle on protecting sensitive data everywhere
SIM adds real-time capabilities but compliance, not threats, stills drives this market
Security and compliance policies are only successful if they are enforced. That’s where network access control comes in.
We sort out the options with the most buzz for 2007—NAC, Vista, and NAP—for enforcing security with devices requesting network resources.