How can you know you haven't been connected to a look-alike server, and how does it know your device isn't infected with malware? New hardware specification models from the Trusted Computing Group may help.
Host-based intrusion prevention runs as a software agent on a user's system, looking for unauthorized actions
New technology lets you hide and verify network identity inside the packets themselves.
Only half of respondents in a new survey say their company has a written security policy. Furthermore, despite the increases in threats, many organizations have been slow to make the appropriate investments in time and budget to properly address them.
Using pattern matching with information taxonomy tools to track sensitive information leaving the company
Kettering Medical Center finds a solution to who sees the data, for how long, and how much data a user can view.
E-mail fraud and vulnerabilities, plus the impact of Microsoft's source code leak
Encrypting, monitoring, and auditing access to actual data
Sarbanes-Oxley, the need to improve monitoring, and a desire to move administration and accountability closer to end users, drove Toro to invest in record-level enterprise application monitoring software from Prodigen.