Why small and medium-size businesses, and satellite offices, are increasingly adopting multi-function security appliances.
New standard specifies XML framework for identity management and provisioning
VeriTest, an independent testing lab, pitted three popular anti-spyware products against each other for four months, but such performance results can be problematic.
Are your backup tapes a security risk? After numerous high-profile tape losses, and the resulting notifications to millions of Americans, many companies still don’t encrypt their backup tapes.
The next-generation Microsoft operating system packs needed security features, but the adoption forecast for Windows-weary enterprises is cloudy.
While many IT managers obsess about hackers and external attackers purloining sensitive company information, studies point to a worse problem: the insider threat.
After the largest known compromise of personal information, the FTC details the information security failures that helped caused it.
Thanks to improved corporate information security practices, attackers are seeking new methods for accessing sensitive corporate information, putting storage media more at risk than ever. We offer several recommendations for destroying data.
Researchers find spyware lives especially on adult, game, and wallpaper sites. The enterprise security mandate is clear: start blocking those sites.
Despite the popularity of instant messaging (IM), many organizations don’t regard the communications channel as an enterprise security risk.
Large enterprises are deploying network behavior analysis tools to supplement firewalls and IPS to block unknown types of attacks and catch stealthy attacks in progress.
Sarbanes-Oxley compliance started chaotically. By its second year, however, many organizations were investigating how automated controls could help them see SOX not as an annual cost but as a way to reduce business risk. What’s in store for year three?
Spyware poses a huge threat—yet a recent survey shows that by their own admission, many enterprises have yet to protect their information with suitable anti-spyware software.
The 2005 SANS Top 20 list of the worst vulnerabilities finds attackers deserting operating system vulnerabilities, for flaws in applications and network devices.
Companies favor security technology, overlook adequate user training
Post-virus attack cleanup costs $200 per system. Taking a layered approach to protection can help keep your PCs safe.
Best practices for creating your disaster recovery plans
Discovering Web application vulnerabilities—which account for a staggering majority of all vulnerabilities seen in the wild—is the easy part. Keeping them fixed is another story.
A forensic readiness program helps a company protect its assets and know when they’ve been compromised.
A new survey reveals the best way to deal with breaches