Security Management


Integrating Physical and Logical Access Control

Two security approaches, working in tandem, provide superior enterprise protection.

How Mobile Computing, Not Windows Desktop, Will Transform Cybercrime

As mobile devices become more ubiquitous, they and not the Windows desktop will become Ground Zero for attacks and exploits.

How Continuous Monitoring Can Help Financial Services Firms Avoid Cyber Attacks

Follow these steps to achieve comprehensive visibility. They aren’t easy but they are necessary.

The Emerging Crimeware Market

The availability and sophistication of crimeware kits has contributed to the rapid evolution -- as well as the increasing sophistication -- of cybercrime itself.

Q&A: Real-World Security Decisions

How do you secure an environment in which risky behavior is business as usual?

7 Steps for Dealing with the People Component of Data Security

We outline seven steps that help you address the people aspect of data security.

New Year, New Threats: The Emerging Security Risks of Social Networking

Completely blocking access to social networking sites or online communities is not necessarily the only -- or the best way -- to stop these threats before they affect your business. The answer may lie in educating your workforce.

Q&A: Data Protection Strategies for Mobile Computing

Best practices for protecting your mobile and enterprise assets.

Spam Takes a Holiday

Talk about post-Christmas letdowns: spam volumes tanked after December 25th. What happened -- and can it last?

Q&A: Securing Your Mobile Environment

How to improve security for mobile users in light of new, complex technologies such as cloud computing.

Security: Data Disposal 101

According to a new study, more than half of U.S. businesses aren’t erasing data from computers or storage assets prior to retiring them.

Modern Antivirus, Whitelisting, and Enterprise Security

Whitelisting applications can be a more effective and lower-impact technique for protecting your enterprise than are traditional antivirus approaches.

A Tough Year that Could Have Been Worse

Security admins faced a host of vulnerabilities and new attacks in 2010, but the nightmare scenarios that could've kept security pros up at night blessedly didn't come to pass.

Q&A: Identity and Access Management

What’s driving the interest in identity and access management, and how can you address the challenges the technology presents?

A 3-Step Defense-in-Depth Strategy for Combating Cyberterrorism

Learn how a "defense-in-depth" strategy can provide greater protection to your enterprise.

Mid-Size Enterprises are Prime Targets

Mid-size shops are increasingly -- even disproportionately -- coming under attack by hackers, yet few security budgets are rising.

Q&A: IAM and the Unix/Linux Organization

Unix/Linux systems needn't be islands of identity; we show you the challenges and options for addressing authentication, provisioning, and security and take a closer look at Active Directory bridges.

The Sad State of Vendor Patches

A controversial new report shows vendors are leaving enterprises seriously exposed.

Security is Bright Spot in IT Spending

Today's security market differs greatly from the market that was hammered almost a decade ago, following the dot.com implosion.

Best Practices for Watching the Watchers

Four questions that promote security and regulatory compliance in your enterprise