Security


Back-to-School Supplies for Secure Campus Networks

Labor Day marks the move-in for most students, and it also marks the beginning of labor-intensive work for IT departments across colleges and universities nationwide. Find out what one institution is doing to secure its network for the school year.

Security and SOX: Are CIOs Missing the Boat?

Many CIOs arrived late to Sarbanes-Oxley efforts

New Yahoo Shield May Dry Up the Phishing Well

One search engine is developing a solution that helps users secure their data from phishing attacks.

New Software to Secure SOA-driven Apps

Security remains a key reason some developers shy away from service-oriented architectures. IBM’s new release may help change that.

Securing Visitors with Guest-Access Controls

A defense contractor turns to admission controls to meet government requirements to secure national security information.

Survey: Windows XP Top Security Concern

Symantec survey focused on IT professionals’ views on vulnerability research and challenges they expect in the next year.

Q&A: How Security Budgets Determine Compliance Success

New study highlights commonalities between companies with the fewest IT compliance deficiencies.



Podcast: Trusted Computing

Three key benefits of trusted computing, and what IT should do now to prepare for trusted computing initiatives

JavaScript Security Vulnerabilities: Weakness in Web 2.0

Demonstrations at last week's annual Black Hat cybersecurity conference employed Web-page-embedded JavaScript to attack corporate servers.

Development Environment Detrimental to Application Security

A dangerous developer mentality can lead to mistakes that leave the most precious of applications susceptible to hackers

Two-Factor Authentication: The Single Sign-on Solution?

New online risk-monitoring and strong-authentication technologies are helping banks meet looming FFIEC online authentication deadlines

Podcast: Creating Strategies to Prevent Internal Threats

Employees who copy data to thumb drives or use the Print Screen button and carry that paper home pose a big threat to any organization.

Filtering Technology Looks Beyond Content

Companies are increasingly deploying filtering technology to address a number of information security threats, ranging from in-bound spyware to unapproved use of VoIP.

Case Study: SUNY-Buffalo Health Science Schools Aim for Network-Admission Controls

The challenge: securing an infrastructure you don’t control

Q&A: Automating Security Controls for Compliance

Can companies use built-in ERP capabilities to better automate their IT controls?

Scan for Security Issues While Building Apps

With the risks in today’s world, one company is taking the “fear” out of Web services with improved app scanning software that puts the developer in the driver’s seat.

SIM Software Aims for SMBs

One company blocks real-time attacks, demonstrates compliance, and relays security effectiveness to executives.

Q&A: Regulations and Security Drive Organizations to Adopt Frameworks

Why organizations are increasingly adopting the IT Infrastructure Library

Security Briefs: Breaches Increase, Trojans Displace Worms

Despite increased security spending, the number of security breaches also increases. Plus, how Trojan applications have displaced worms and viruses as top threats—and why.

Five Tips for Securing VoIP

Thanks to immature standards, competing protocols, and nascent products, keeping VoIP secure isn’t easy. Here’s where to start.