Security Management


Securing a Virtualized E-mail System

The optimal solution for most companies looking to lower the operating expenses associated with an e-mail environment through virtualization is to deploy a hybrid approach.

The Security Risks of Enterprise Search

We expose five security risks introduced by enterprise search and explain how you can protect your enterprise from these vulnerabilities.

E-mail Attachments: Misperceptions That Can Compromise Security

Organizations may be under several misunderstandings about the safety of their e-mail attachments. We explore the risks and corrective action IT can take to reduce the vulnerabilities.

RSA: Report Reveals 7 Cloud Computing "Sins"

Security too often is taken on trust, report says.

A Desktop Operating System Security Report Card

A prominent security firm says that the security features of both Windows 7 and Mac OS aren't quite up to snuff.

Security Tops IT's Concerns, Symantec Study Finds

Global study of security personnel identifies goals, points out risks and staffing issues

Enterprise Applications in the Cloud: A SaaS Security Perspective

The security challenges and mitigation strategies to help you migrate your enterprise applications to the cloud while ensuring your data’s safety.

Q&A: Assessing Cybersecurity's Past, Planning for the Future

Where is cybersecurity headed? We look at how regulation, social networking, and popular technologies (such as cloud computing) will impact your enterprise’s security management.

Why IT Asset Management is Critical to Your Network Security

Asset management software can complement your current security tools to provide more complete desktop security.

The Sleeper Cellular Issue

IT organizations are highly exposed to security breaches through their information worker's mobile devices.

Security Focus in 2010: Internal Threats, Cloud Computing, and Mobile Devices

CA’s chief security architect discusses the three key areas for security professional’s attention this year.

The Enterprise's Achilles' Heel: Cellular Security

IT shops aren't doing enough to secure their cellular communications. This leaves them wide open to attack. The stakes are high -- and likely to get even higher.

Security: A CTO's Crystal Ball

From virtualization to cloud computing, what today's trends tell us about the focus of security professionals next year.

Five Security Chores for 2010

What kept security administrators awake nights this year, and where should they focus their attention next year?

Security: The Year in Review

Compared to other market segments, the security space was a relative safe harbor in a year of economic turbulence.

5 Steps to a More Secure Data Center

In the age of virtualization and cloud computing, administrators need a holistic approach.

Bridging Security Gaps to Prevent Data Breaches

Today’s cybercriminal is especially aggressive about penetrating networks to gain access to valuable data. We explain what steps you must take now to protect your systems.

Malware Attacks the Software Update Process

How performing a software update can hijack your system.

Health-care Providers Racing to Comply with New Security Safeguards

Health-care providers are once again racing to ensure compliance with another set of information security safeguards.

Security: Spam for the Holidays

This year, spammers are more proactive than ever, and that has some security researchers worried.