Security Management


CA Rolls Out Tape Encryption for Mainframes

Options proliferate for encrypting your z/OS backup tapes

Employees Cause Most Security Breaches, Yet Response Lags

What’s the best way to stop users from inadvertently compromising your company’s information security?

Q&A: Stopping Blended Threats with Multi-Function Security Appliances

Why small and medium-size businesses, and satellite offices, are increasingly adopting multi-function security appliances.

Executives Unhappy with Current Security Metrics

Faced with decreased security spending and executives who decry the state of security reporting, security managers need better report-writing skills.

Why Automated Patch Management Remains Elusive

Patching remains a manual, time-intensive process, despite more automated tools.

Active Directory in Vista: Same Name, Substantial Changes

Don’t let the lack of a name change fool you. Under Vista, Active Directory and Group Policy settings get a substantial makeover, and that has security-policy management, endpoint security, and backwards compatibility implications. Here’s what to expect.

More Vista Security Details Emerge, But Will Enterprises Bite?

The next-generation Microsoft operating system packs needed security features, but the adoption forecast for Windows-weary enterprises is cloudy.

Building Better Applications: Beyond Secure Coding

While teaching developers “secure coding” techniques is important, experts say far more is needed to actually produce secure applications.

Fixes from Microsoft and Adobe, Havoc from McAfee

Microsoft released six critical updates for PC and Mac, and Adobe patched Flash. Grabbing headlines, however, was the file-eradication spree triggered by an update to McAfee's antivirus program, causing users to question automatic patches.

Q&A: IT in Denial over Spyware

While many small and medium-size companies fear spyware, they don’t think spyware infections can happen to them. Despite highlighting viruses, worms, and spyware as top network security concerns, many don’t actively combat even one of these problems.

Case Study: Patching the SAFE Federal Credit Union

The need to automate time-consuming, manual patch processes drove one financial institution to adopt patch management software.

Beyond Firewalls and IPS: Monitoring Network Behavior

Large enterprises are deploying network behavior analysis tools to supplement firewalls and IPS to block unknown types of attacks and catch stealthy attacks in progress.

Computer Forensics: Still in the Stone Age

Despite the popularity of forensic science, automated, digital evidence-gathering and analysis tools lag.

Vulnerability Roundup

Last week, Oracle released a critical patch update for a SQL attack vulnerability that could give local attackers administrator-level privileges, and Apple patched Windows and Apple OS versions of QuickTime. Meanwhile a new report finds online attacks are hitting the bottom line.

A Marriage of Convenience (and Security)

Many organizations have reached or exceeded their ability to support the growing security management headaches and are facing compromises. What we need is a complete suite of top-tier security technologies administered from a single, unified console. Is that even possible?

Careers: Strong Demand Continues for Information Security Jobs

With information security increasingly a boardroom-level concern, job prospects continue to be good, according to a new study. Training and certification are becoming increasingly important for candidates and companies alike.

Q&A: The 2006 Threat Landscape

Symantec anticipates kernel-level rootkits, and more covert channels for siphoning intellectual property

Q&A: What Makes a Good Chief Information Security Officer?

To succeed, a chief information security officer needs project management skills, business process expertise, a budget, and authority—and an aptitude for diplomacy.

Can Networks Defend Themselves?

Just think of it: routers and switches no longer need separate firewalls, IDS/IPS appliances, or other security technologies to shield themselves from attacks. Fewer boxes to maintain, fewer management systems to support—what’s not to like? As it turns out, plenty.

Malware Clean-Up Swamps IT Managers

Companies favor security technology, overlook adequate user training