Are companies’ current wireless router security practices sufficient? Security policies are too often manually applied, and it shows.
The growth in Web Services and service-oriented architectures enables businesses to more quickly and automatically trade information and computing resources. Now it’s up to federated identity management to secure it.
Will 2006 be the year of endpoint security? A number of network-access-control approaches are finally coming to fruition.
Giving mobile users access to enterprise applications and internal portals via an SSL VPN can be tricky. Midwest Wireless' implementation was exceptionally smooth. What's their secret?
Using a password hash, attackers can crack a database in about four minutes
Watching inbound and outbound Web applications communications for signs of attack
Securing access in the post-mainframe world
Planning identity management or authentication rollouts? Don’t forget to factor in the Trusted Computing Modules now built into many PCs.
SAML, Liberty, WS-Federation—a number of Web Services standards are competing for security managers’ attention. Here’s how to differentiate between the options.
The term “endpoint security” includes new types of technology, which makes sense when Polysius’ manager of IT details the myriad, evolving threats to his corporate network, and the company's defenses.
It's difficult to audit administrative passwords if you're not managing them properly. That's what drove Manitoba Lotteries Corp. to employ a password vault.
Too often, Microsoft’s Active Directory and its Group Policy Objects don't offer the granularity security administrators need.
More organizations are using fingerprints for logging onto PCs and into sensitive applications.
Identity management software adoption is increasing, but many organizations still rely upon too many group permissions to effectively manage their implementations.
CSOs worry about infected or unknown PCs logging onto their networks, but only one-third of companies are doing something about it
How organizations can get (and stay) compliant while spending less
Architecting fine-grained access to Web Services for many users at multiple organizations is difficult to implement or audit using identity management software. We discuss alternatives.
The differences between signature-based, access control, and intrusion prevention products
CA Antivirus Vulnerabilities; AOL Patches New Netscape; Beware Phishing E-mails Bearing Keylogging Software; New Trojan Encrypts PCs
Sometimes the drive for better security can also bring cost savings.