From panel discussions to workshops (where you can ask your own tough questions), this fall's trade shows offer a wealth of information and perspective from vendors big and small.
CERT’s Coordination Center outlines the top steps businesses, vendors, and the government can take to arrest the onerous cycle of constant patching.
From carrots to sticks, a variety of recent regulations has presented a challenge to security managers. We ask a security expert where U.S. and European regulations are headed.
Versions of OpenSSH prior to 3.7.1 are vulnerable to denial of service attacks via a buffer management problem. We explain the problem and what you can do about it.
Big Blue discusses the idea of reducing network and application tiers, and offers a model that combines zSeries technology with Intel-based server blades.
Answer ten short questions to gain insight on how satisfied you are with your career.
IBM and Microsoft are fierce competitors, but they've united to deliver protocols that will deliver a reliable and secure messaging and transactional infrastructure for heterogeneous environments.
Microsoft CEO Steve Ballmer acknowledged last week that his company has been "humbled" by the effects of the Blaster and Sobig.F worms, and outlined his company's "comprehensive approach for better se
Vendors must learn that juxtaposing one’s own products with EMC’s as a means for advancing one’s own value proposition is silly.
Can information security professionals really get certified in half the ordinary time?
The dot-com boom’s legacy: buggy code. How do you find those bugs? Instead of trying to do code reviews with tools that were meant for developers, it's time to do them with tools meant for security
Yankee Group predicts large growth in the authentication market. Here are three things every organization needs to do to ensure users are who they say they are.
A new iSeries offering provides mainframe-like features—advanced backup, replication, and high-availability clustering—across IBM's eServer product line.
The secret: an integrated business design
Spectra Logic proves it offers products and pragmatism; Python will raise the bar for other vendors.
Handheld security expert suggests best practices for organizations that support the devices
Vulnerability in Microsoft applications occurs thanks to Visual Basic for Applications
Central Command shows a single virus accounted for over three-quarters of all activity last month.
To allay PeopleSoft users' fears, company tries to show it can do right by an acquisition.
Web-based solution simplifies connecting users to legacy applications for insurer