Security Management


Q&A: Taking a Risk-Based Approach to Security

Security is more than just determining which users have access to applications and data. Compliance also isn't enough. What's needed is a risk-based approach to security -- a pro-active, prevention-oriented line of attack to keep your enterprise safe.

Keyloggers: The Most Dangerous Security Risk in Your Enterprise

How keyloggers work and spread, why anti-virus applications won't stop them, and how you can protect your enterprise.

More Tips for Next-Generation Firewalls: Security Policy Management

We examine policy considerations and how to manage security policy in a mixed environment.

Q&A: The State of Data Security, Compliance, and Why Your Company May Be at Risk

A study of corporate e-mail and file transfer habits highlights security concerns.

3 Tips for Next-Generation Firewalls: Sizing and Deployment

Before you implement a next-generation firewall, follow these three tips to ensure project success.

Q&A: Keeping Mobile Applications Secure

How can you make sure your mobile applications are secure? A security expert offers several suggestions.

5 Rules for Reining in Key Sprawl

Following these five rules will help your organization get your security keys under control.

Q&A: User Authentication Challenges, Best Practices, and the Future

Usernames and passwords are no longer enough to secure your data. We explore the benefits and costs of more advanced end-user authentication.

Q&A: Setting the Proper Security Rights (Case Study)

Getting just the right mix of security and user friendliness at Movado.

Top 5 Enterprise Security Trends

From BYOD to social media, the trends that are keeping security administrators on their toes.

PCI Compliance in the Cloud

If you store, process, or transmit card account data, youmust comply with the PCI data security standard. We explore the basics, including why DevOps teams needs to be compliant.

How VM Introspection Transforms Honeynets into Lean, Mean, APT-fighting Machines

In the right hands, a honeynet can be a powerful weapon in the war against advanced persistent threats. If you're contemplating adding advanced honeynets to your organization's arsenal, here are five things to consider.

Cloud Security Services Help SMB Buyers Brook Budget Woes

SMB customers have a growing appetite for cloud-based security services. It isn't likely to be sated anytime soon. Thanks to a perfect storm of economic and technology trends, SMB consumption of cloud security services is expected to increase sharply over the next five years.

VDI Access Control in the Age of BYOD

VDI deployments offer benefits beyond simply managing the software installed base and lowering operations costs.

The CCO’s Dirty Little Secret

A look at the true cost of compliance failures and how to avoid being buried in trouble.

An Introduction to Deep Content Inspection

Traditional deep packet inspection may no longer be able to protect your environment. We look at a new approach -- deep content inspection.

Tackling Today's Firewall Management Issues

Thanks to the ubiquity of firewalls, security administrators have no shortage of options and solutions. We examine the state of firewall management in today's data center.

The Network’s Role in Securing Cyberspace

No single technology can enable a fully secure network. The three-layer model we present can guide your organization in making key improvements to your network security.

Q&A: Why Big Data Security in the Cloud is No Small Matter

Big data and cloud computing are two top-of-mind technologies. What benefits can IT enjoy by bringing them together?

New Regulations Bring Advancements in Data Governance

As critical unstructured data grows exponentially amid a variety of data privacy laws, organizations are turning to data governance automation.