From smarter criminals to network access protection, IT is going to have its hands full in 2007.
For sensitive data sitting on a portable, encryption is no longer an option. It’s a necessity.
IT needs to adopt a multi-step approach—moving from denial to active management—and address enterprise IM use.
New study shows disconnect between executives' understanding and action
Guarding against external threats is important, but don’t overlook legacy systems security.
Three key features IT should look for when shopping for a UTM solution.
EdgeSecure makes it easier to protect data stored in remote locations.
Protecting mission-critical data means looking at port and USB vulnerabilities.
Broken lock: $25. Stolen laptop: $1,500. The cost of corporate data breach: Priceless. Learn how to deploy resources and leadership to most effectively deal with the aftermath of sensitive data exposure.
V.i. Laboratories promises that CodeArmor can application code from piracy and reverse engineering
A defense contractor turns to admission controls to meet government requirements to secure national security information.
New online risk-monitoring and strong-authentication technologies are helping banks meet looming FFIEC online authentication deadlines
Can companies use built-in ERP capabilities to better automate their IT controls?
One company blocks real-time attacks, demonstrates compliance, and relays security effectiveness to executives.
Changes target regulatory compliance, auditing, and access controls
How to evaluate the security of applications you build or buy, and justify those requirements to senior management.
Most college Web sites lack online privacy policies. What does that say about their ability to secure people’s private information and to avoid data breaches?
Options proliferate for encrypting your z/OS backup tapes
Why small and medium-size businesses, and satellite offices, are increasingly adopting multi-function security appliances.
New standard specifies XML framework for identity management and provisioning