Security Management


Case Study: Outsourcing Threat Detection

With an increasing number of threats and limited IT staff resources, one company turns to outsourcing network monitoring

Q&A: Natural Disasters Drive Renewed Focus on Backup/Recovery Plans

Best practices for creating your disaster recovery plans

Regulations Driving E-mail, IM Backup and Recovery

Thanks to a variety of regulations, businesses must retain e-mail and instant messages, creating an information glut. Here’s how to manage it.

Q&A: Monitoring What Web Applications Divulge

Watching inbound and outbound Web applications communications for signs of attack

Forensic Contingency Planning: Where to Start

A forensic readiness program helps a company protect its assets and know when they’ve been compromised.

Case Study: Furthering Role-Based Access

Securing access in the post-mainframe world

Preventing Risky Password Practices

Users hate passwords, and it shows.

Bot Networks and Modular Code Target Enterprises

Increased attacks are driven by money and modularity.

Improving Automated Vulnerability Remediation

Given the incredibly small window afforded IT managers for patching vulnerable systems, security experts recommend getting help in categorizing vulnerabilities as well as in determining which are actually present.

Sarbanes-Oxley: Enterprises Turning to Automation

Automated security and access controls get top attention as enterprises move into their second year of Sarbanes-Oxley compliance.

Putting IPS Claims to the Test

A neutral, third-party testing organization rates IPS performance, accuracy, and reliability.

Evaluating the New ISO 17799 Standard

ISO 17799, the world’s most-used information security framework, gets updated.

Zotob Continues to Hammer Windows 2000

Exploits are already circulating for a recently announced Windows plug-and-play vulnerability. Experts recommend better endpoint security controls.

Microsoft Can’t Count: New Vulnerability Disclosure Criticism

Microsoft details five critical vulnerabilities, including flaw that could be automatically exploited by a malicious Web page or e-mail

CSI Study Reveals Shifts in Security Threats

The latest Computer Crime and Security Survey shows cybercrime incidents and the cost of security breaches are decreasing, but Web site attacks and thefts of sensitive information are rising quickly.

Is Too Much Anti-Spyware a Bad Thing?

An end user with two real-time anti-spyware engines asks if too much anti-spyware software is a bad thing

The New Security ROI

It's tough to determine an ROI for security investments. Looking at cost avoidance may be the way to go.

Case Study: Containing Endpoint Infections

How can organizations better contain virus outbreaks and defend against destructive or mass-mailing worms?

Enterprises Battle Cyber-Criminals, Targeted Attacks

Automated worms and malware-born invaders are still wreaking havoc in the enterprise, and financial losses from cyber-criminals are increasing.

Q&A: Workarounds for Active Directory's Limitations

Too often, Microsoft’s Active Directory and its Group Policy Objects don't offer the granularity security administrators need.