Administrator rights let users do everything on a system, but these rights are also the target of malware and other vulnerabilities.
Mainframe operators know which controls to implement, but auditors -- who frequently come from the distributed side of the divide -- don’t.
Threats delivered through the Web are increasing in number and severity. A Web filtering solution can reduce an enterprise’s vulnerability.
Proper planning that includes addressing security will help you reap the benefits of virtualization and satisfy those who ensure business continuity and protect corporate data.
A recent report by AirTight Networks finds financial services firms are all but throwing out a welcome mat to wireless attacker
To effectively address new security challenges, IT organizations need to tighten coordination and integration between security.
Unless you employ appropriate safeguards, a minor Twitter problem could easily turn into a tempest.
Phishing activity increased by almost 40 percent in a 12 month period.
Awareness that a thorough security policy should include measures for secure network printing is rising slowly but surely.
A new report shines light on Web-based attacks, concluding that -- in terms of both volume and variety -- they pose a significant, and significantly expanding, threat.
Majority of IT operations use semi-automatic or manual processes to manage configuration settings
Spammers are tweaking their messaging to better exploit recession-related fear, uncertainty, and doubt
How an enterprise’s culture affects its IT security
ID fraud spiked last year by almost a quarter, yet the total amount bilked by ID thieves rose only slightly.
If you’re looking to breathe extra life into your fleet of PCs and to keep your network as secure as possible, make sure you’re using a secure Web filter.
To successfully address weaknesses in current e-mail security, IT departments can take six proactive steps now to help their enterprises meet compliance regulations and prevent e-mail misuse.
One of the biggest threats facing your organization is already installed on your desktops: admin rights for end users
We look at the purpose and best use of groups and roles.
Why now is not the time to cut security budgets.
Security vendors are stepping up their efforts to close the gap between security and operations