Security Management


Batten Down the Hatches on IBM i

Just because you can't name the last IBM i-specific security issue doesn't mean your IBM i platform is secure.

Q&A: IT Risk and Security Management

A recent breach in Utah once again raises the need for IT to implement IT risk and security management on servers. What's holding IT back?

Q&A: Cloud Security 101

When considering moving to the cloud, most IT shops have concerns about security. We tackle several of the most common questions.

Conficker Tops Security Concerns in Microsoft Security Report

Conficker worm will continue to trouble IT despite lack of new variants in two years.

Q&A: Setting Up a Second Line of Defense

Organizations will have to accept that their gates will be breached and begin preparing their second line of defense -- data platforms -- to mitigate the damage caused by attacks that get through.

The Undervalued Security Benefits of IPsec

IPsec is a secure, robust, and transparent network widely available to businesses with smaller overhead than you might think.

Eye on Security: Integrating Physical and Cyber Security

We explore the benefits of interconnecting physical and cyber security.

Q&A: Managing Endpoints and Mobile Devices

Mobile devices are just one of a number of assets that must be managed. Fortunately, the cloud can help.

A 3-Step, Least-Risk Approach to Securing Windows 7

A best-practices approach and advice for securing your Windows 7 environment.

Cloud, Mobile, and the Fed: How the Government is Shaping Open Identity

Changing identity and access management needs are pressuring IT to revise its security strategies. Why is the federal government involved?

4 Best Practices for Mitigating DDoS Effects

These four best practices will help government and political organizations mitigate the effects of DDoS attacks.

Updated OpenSSL Libraries Patch Potential Information Disclosure, DoS Flaws

SSL and TSL are used to encrypt almost all sensitive communications traffic on the Internet.

How Mobile Cloud Will Make Security Priority #1

A look at how security is evolving around three key information technology developments.

Will Advanced Persistent Threats Grow in 2012?

What predictions can we draw from the threats IT battled in 2011 about what’s ahead in 2012?

Manage the Breach or the Breach Will Manage You

Several high-profile security breaches occurred in 2012. What’s ahead for security administrators in 2012, and how will IT respond?

Three Trends Driving Data Security Strategies in 2012

In 2012, businesses must align data security with customer value.

Large December Security Patch Released by Microsoft

Of 13 items in release, 3 address remote code execution flaws.

The (Ugly) Year in Security

For security administrators, RSA's disclosure of a hack was just one of many serious breaches that occurred in a very bad year.

Q&A: Best Practices for z/OS Security

Mainframes are typically more secure than most other platforms, but that doesn't mean IT can ignore them.

Complex Attacks Bypassing Enterprise Safeguards

Enterprises are increasingly being targeted by complex attacks designed to bypass existing safeguards.