Options proliferate for encrypting your z/OS backup tapes
What’s the best way to stop users from inadvertently compromising your company’s information security?
Why small and medium-size businesses, and satellite offices, are increasingly adopting multi-function security appliances.
Faced with decreased security spending and executives who decry the state of security reporting, security managers need better report-writing skills.
Patching remains a manual, time-intensive process, despite more automated tools.
Don’t let the lack of a name change fool you. Under Vista, Active Directory and Group Policy settings get a substantial makeover, and that has security-policy management, endpoint security, and backwards compatibility implications. Here’s what to expect.
The next-generation Microsoft operating system packs needed security features, but the adoption forecast for Windows-weary enterprises is cloudy.
While teaching developers “secure coding” techniques is important, experts say far more is needed to actually produce secure applications.
Microsoft released six critical updates for PC and Mac, and Adobe patched Flash. Grabbing headlines, however, was the file-eradication spree triggered by an update to McAfee's antivirus program, causing users to question automatic patches.
While many small and medium-size companies fear spyware, they don’t think spyware infections can happen to them. Despite highlighting viruses, worms, and spyware as top network security concerns, many don’t actively combat even one of these problems.
The need to automate time-consuming, manual patch processes drove one financial institution to adopt patch management software.
Large enterprises are deploying network behavior analysis tools to supplement firewalls and IPS to block unknown types of attacks and catch stealthy attacks in progress.
Despite the popularity of forensic science, automated, digital evidence-gathering and analysis tools lag.
Last week, Oracle released a critical patch update for a SQL attack vulnerability that could give local attackers administrator-level privileges, and Apple patched Windows and Apple OS versions of QuickTime. Meanwhile a new report finds online attacks are hitting the bottom line.
Many organizations have reached or exceeded their ability to support the growing security management headaches and are facing compromises. What we need is a complete suite of top-tier security technologies administered from a single, unified console. Is that even possible?
With information security increasingly a boardroom-level concern, job prospects continue to be good, according to a new study. Training and certification are becoming increasingly important for candidates and companies alike.
Symantec anticipates kernel-level rootkits, and more covert channels for siphoning intellectual property
To succeed, a chief information security officer needs project management skills, business process expertise, a budget, and authority—and an aptitude for diplomacy.
Just think of it: routers and switches no longer need separate firewalls, IDS/IPS appliances, or other security technologies to shield themselves from attacks. Fewer boxes to maintain, fewer management systems to support—what’s not to like? As it turns out, plenty.
Companies favor security technology, overlook adequate user training