Why organizations are increasingly adopting the IT Infrastructure Library
Most college Web sites lack online privacy policies. What does that say about their ability to secure people’s private information and to avoid data breaches?
Faced with decreased security spending and executives who decry the state of security reporting, security managers need better report-writing skills.
New standard specifies XML framework for identity management and provisioning
Speaking a language spyware purveyors understand: fines and jail time
Regulated companies are increasingly adopting NAC to screen network access, enforce security policies, and block malware outbreaks.
After the largest known compromise of personal information, the FTC details the information security failures that helped caused it.
The growth in Web Services and service-oriented architectures enables businesses to more quickly and automatically trade information and computing resources. Now it’s up to federated identity management to secure it.
Increasing numbers of mobile users and poor laptop security management creates a growing risk; a new specification pushes trusted-storage applications
How quickly can you search and retrieve e-mail and instant messages relevant to a regulatory inquiry or court-ordered discovery process?
The FTC says federal anti-spam legislation is effective. Experts disagree.
Will 2006 be the year of endpoint security? A number of network-access-control approaches are finally coming to fruition.
Regulations, application vulnerabilities, data breaches, and evolved malware accounted for 2005’s top security trends. We look ahead to what’s in store for 2006.
Sarbanes-Oxley compliance started chaotically. By its second year, however, many organizations were investigating how automated controls could help them see SOX not as an annual cost but as a way to reduce business risk. What’s in store for year three?
Thanks to a variety of regulations, businesses must retain e-mail and instant messages, creating an information glut. Here’s how to manage it.
A new survey reveals the best way to deal with breaches
With the average public data breach costing $7.5 million to clean up, security managers seek automated hard disk encryption.
Planning identity management or authentication rollouts? Don’t forget to factor in the Trusted Computing Modules now built into many PCs.
Automated security and access controls get top attention as enterprises move into their second year of Sarbanes-Oxley compliance.
SAML, Liberty, WS-Federation—a number of Web Services standards are competing for security managers’ attention. Here’s how to differentiate between the options.