New IT consumers are more comfortable with, and knowledgeable about, technology, and that’s a problem
The Web 2.0 paradigm shift is fraught with both promise and danger
Sleeping laptops may be the next way hackers steal encrypted information
With mobile security, the devil you don’t know can hurt you much more than the devil you think you know
PGP Corporation may have the handle on protecting sensitive data everywhere
We sort out the options with the most buzz for 2007—NAC, Vista, and NAP—for enforcing security with devices requesting network resources.
Are companies’ current wireless router security practices sufficient? Security policies are too often manually applied, and it shows.
Regulated companies are increasingly adopting NAC to screen network access, enforce security policies, and block malware outbreaks.
Thanks to improved corporate information security practices, attackers are seeking new methods for accessing sensitive corporate information, putting storage media more at risk than ever. We offer several recommendations for destroying data.
Increasing numbers of mobile users and poor laptop security management creates a growing risk; a new specification pushes trusted-storage applications
Giving mobile users access to enterprise applications and internal portals via an SSL VPN can be tricky. Midwest Wireless' implementation was exceptionally smooth. What's their secret?
The term “endpoint security” includes new types of technology, which makes sense when Polysius’ manager of IT details the myriad, evolving threats to his corporate network, and the company's defenses.
Is it true that the storage world is upside down in the southern hemisphere, too?
Microsoft Updates XP WiFi Security, Worm Goes Right-Wing
CA Antivirus Vulnerabilities; AOL Patches New Netscape; Beware Phishing E-mails Bearing Keylogging Software; New Trojan Encrypts PCs
Sometimes the drive for better security can also bring cost savings.
Executives Decry Cost of SOX, IM Security Still a Concern, and a Mobile Phone Worm Evolves
If your phone is so smart, why is it an enterprise security risk?
How can IT managers secure endpoints over which they have no control?
Resistance, then acceptance of automated e-mail retention; reports of spam’s decline premature