Security Management


Enterprises Struggle with Identity Management Roles

Identity management software adoption is increasing, but many organizations still rely upon too many group permissions to effectively manage their implementations.

In Brief

Beware Standalone Patch Products, Banks Adopt More Security, Improving Can-Spam

Q&A: How to Get and Keep a Security Job

Focus on social networking, ongoing analysis of today’s most-needed information security skills, and a diverse training regimen.

In Brief

Bluetooth Attack Compromises PINs, New Smart Phone Malware, Charting the E-mail Security Market

In Brief

CA Antivirus Vulnerabilities; AOL Patches New Netscape; Beware Phishing E-mails Bearing Keylogging Software; New Trojan Encrypts PCs

Few Organizations Increase Spending to Improve Security

While operator errors get blamed for the majority of security incidents, organizations aren’t budgeting a fix.

In Brief

Avoiding Time Warner’s Backup Mistakes; Learning from Loveletter; Tivoli Offers Security Index

Best Practices: Defending Against Insider Attacks

A new report from CERT and the U.S. Secret Service shows how to begin preventing insider attacks.

Case Study: Continental Secures Remote Access, Trims Costs

Sometimes the drive for better security can also bring cost savings.

SANS Top Vulnerability List Gets Quarterly Updates

List helps prioritize vulnerability patching

Q&A: Enterprises Shift to All-in-One Security Appliances

Why use separate firewall, intrusion detection and prevention, gateway antivirus, and VPN products when one appliance can handle it all?

Your Next Battle Front: Network-Based Worms

As the effectiveness of e-mail worms decreases, attackers turn to network-based worms.

Q&A: How to Secure a Critical Infrastructure

A cybersecurity group works to improve security in the chemical industry.

What's Ahead for Enterprise Anti-Spyware

Performance takes biggest hit from spyware today; look out for spyware working as a phishing aid

Ignorance of Spyware in the Enterprise Still High

What happens when an organization with spyware problems can’t install anti-spyware software on every system?

Tips for CSOs: How to Discuss Security Issues with Executives

Many CSOs still have difficulty communicating security requirements to their more business-oriented peers.

Q&A: Security Policy Best Practices

Communication and monitoring are key, but policies must evolve with changing regulations and new technologies

Corporate Security Awareness Grows but Funding Lags

Survey shows security managers still face budget battle

Buyer Beware: Putting Intrusion Protection to the Test

A new report examines IPS products in rigid performance, security, and usability tests.