Security


Q&A: Setting the Proper Security Rights (Case Study)

Getting just the right mix of security and user friendliness at Movado.

A CxO’s Guide to Understanding Today’s Most Dangerous Attacks

To understand how to counter stealth malware threats, you first need to understand the nature and sophistication of these attacks at each of their four stages.

Top 5 Enterprise Security Trends

From BYOD to social media, the trends that are keeping security administrators on their toes.

PCI Compliance in the Cloud

If you store, process, or transmit card account data, youmust comply with the PCI data security standard. We explore the basics, including why DevOps teams needs to be compliant.

Cloud Security Services Help SMB Buyers Brook Budget Woes

SMB customers have a growing appetite for cloud-based security services. It isn't likely to be sated anytime soon. Thanks to a perfect storm of economic and technology trends, SMB consumption of cloud security services is expected to increase sharply over the next five years.

How VM Introspection Transforms Honeynets into Lean, Mean, APT-fighting Machines

In the right hands, a honeynet can be a powerful weapon in the war against advanced persistent threats. If you're contemplating adding advanced honeynets to your organization's arsenal, here are five things to consider.

VDI Access Control in the Age of BYOD

VDI deployments offer benefits beyond simply managing the software installed base and lowering operations costs.



Q&A: Addressing BYOD with Identity-Based Security

Bring-your-own-device approaches can be a nightmare for security administrators. Identity-based security can help eliminate risks posed by mobile hardware.

IAI: Big Data Analytics for Data Security

IAI is a new approach to the problem of identifying unauthorized user behavior that augments other types of security products and processes. Here's how it works.

The CCO’s Dirty Little Secret

A look at the true cost of compliance failures and how to avoid being buried in trouble.

An Introduction to Deep Content Inspection

Traditional deep packet inspection may no longer be able to protect your environment. We look at a new approach -- deep content inspection.

Tackling Today's Firewall Management Issues

Thanks to the ubiquity of firewalls, security administrators have no shortage of options and solutions. We examine the state of firewall management in today's data center.

The Network’s Role in Securing Cyberspace

No single technology can enable a fully secure network. The three-layer model we present can guide your organization in making key improvements to your network security.

Q&A: Why Big Data Security in the Cloud is No Small Matter

Big data and cloud computing are two top-of-mind technologies. What benefits can IT enjoy by bringing them together?

New Regulations Bring Advancements in Data Governance

As critical unstructured data grows exponentially amid a variety of data privacy laws, organizations are turning to data governance automation.

Batten Down the Hatches on IBM i

Just because you can't name the last IBM i-specific security issue doesn't mean your IBM i platform is secure.

Q&A: IT Risk and Security Management

A recent breach in Utah once again raises the need for IT to implement IT risk and security management on servers. What's holding IT back?

Q&A: Cloud Security 101

When considering moving to the cloud, most IT shops have concerns about security. We tackle several of the most common questions.

Conficker Tops Security Concerns in Microsoft Security Report

Conficker worm will continue to trouble IT despite lack of new variants in two years.

Security Woes: Apple Hits the Big Time

Malware, as Microsoft could have told Apple, comes with the territory. Last year saw a surge in Mac-related malware; 2012 has sustained that trend in a big way.