Security Management


What’s Next for Data Security: Convergence

We’re on the threshold of witnessing a convergence of data security initiatives that may be the only real choice some enterprises will have to ensure consumer privacy and organizational confidentiality.

Q&A: Why Strong User IDs and Passwords are Weak Security Measures

Why a username and password are no longer adequate to protect your enterprise's assets.

State of Spam: Dramatic Rise in Volume, Size, and Malware

The prevalence of spam-based malware increased dramatically in September, surging by 900 percent.

UAC Changes and Windows 7 Security

What Microsoft's changes to user account control mean for the enterprise

Outsourcing's Impact on Network Security Still Uncertain

Despite IT pros' concerns about outsourcing's net effect on network security, the true impact is still unclear.

Q&A: Meeting the Challenges of Database Security

Proactive steps you can take to safeguard databases from internal and external attacks.

How to Avoid NAC Pitfalls with a Standards-Based Approach

With so many benefits to reap from network access control, why aren't all IT shops on board?

Symantec Ups the Ante with Quorum Technology

Symantec's new Norton-branded offerings use a new technology to plug the gap between whitelists and blacklists.

Q&A: Staying Ahead of Network Security Issues

Where should IT focus its attention in protecting network assets, what investments offer the best return, and how can IT to avoid common mistakes when developing its security strategy?

Are Financial Industry Security Administrators Losing the War?

In the online banking segment, some industry watchers warn, the bad guys are winning the war against unsuspecting account holders.

Security: In Praise of Common Sense

A new report from McAfee underscores that if users are successfully initiating celebrity-themed Web searches, IT hasn’t done its job.

Q&A: Staying Ahead of Network Security Issues

Where should IT focus its attention in protecting network assets, what investments offer the best return, and how can IT to avoid common mistakes when developing its security strategy?

People and Processes Key to Faster SIEM ROI, Secure Business

These five best practices will help deliver success more rapidly and ensure increasing return on investment.

New Attacks Use Old Tricks

Attackers are unearthing old exploits -- in the case of the infamous CodeRed worm, extremely old exploits -- to wreak havoc on businesses and consumers.

July DDoS Damage Could Have Been Contained

Far from being exemplary of the state-of-the-art in cyber warfare, July’s DDoS attacks were exemplary of something else: the state-of-the-mundane.

Data Protection Guidelines for the Obama Administration

Although considerable sweat and tears have gone into data protection standards, it's time to spur discussion about how our data protection thinking and schemes might benefit from new ideas and technologies.

When SSL Just Isn't Enough

Recent FTP thefts affecting even SSL-encrypted logins are the work of a new Trojan called Zeus; 90,000 logins may have been compromised.

Developer Access: The Threat Within

Creating a holistic, enterprise-wide security approach is a daunting task. These tips can make it easier.

Spam Levels Continue to Surge, MessageLabs Reports

Spam levels surged in May, but technologies such as traffic and connection management helped reduce or rein-in the volume of malicious traffic.

Business Executives Don't Tie Disaster Recovery Efforts to Business Success, Study Reveals

There's a significant disconnect between IT and business executives when it comes to disaster recovery preparedness.