Security Management


Yankee Group Says Security Outsourcing Set to Explode

Managed security service providers to dominate security market by 2010

Five Steps to Enforcing Your Endpoint Security

Your security policy has to have teeth. Here's how to enforce your endpoint security policy.

Passing the WLAN Security Buck

Company offers outsourced wireless LAN to overcome security vulnerabilities

Briefs

More XP SP2 woes, fraud awareness survey, Can-Spam's failure

CA Jumps into Anti-Spyware Market

Acquisition of PestPatrol signals single-console management of viruses, spam, and spyware may not be far away.

New Technology Combats Zero-Day Attacks

Exploits expected to get worse, putting even more pressure on security managers

Web Caller-ID Arrests Spoof Sites

New technology in a user-friendly toolbar intercepts users from visiting such sites

Top 10 Security Modifications in Windows XP Service Pack 2

This XP Service Pack should be called a Security Pack

Top Five Security Control Points Auditors Miss

Make sure you check these essential control points in any Windows network audit

Security Briefs

Active X Allows File Loading; Defining Spyware

Rethinking Security/Network Boundaries

IT is reassessing how network administrators and security personnel can work together more effectively

Four Criteria for Evaluating a Security Vendor

When evaluating security products for your enterprise, make sure you also evaluate the vendors themselves using these criteria.

Q&A: Top Tips for Outsourcing Security

Symantec's head of Managed Security Services offers his perspective on what you should look for when considering a move to outsourced security

Security Event Management: It Pays to be Proactive

To resist downtime and attacks, many organizations are turning to security event management software, which collects and analyzes information from a variety of devices, PCs, servers, and firewalls, giving security administrators a consolidated view of network security.

Q&A: Stress Testing Your Network Against DoS Attacks

While most companies don’t face worms designed to turn computers against them, denial-of-service attacks remain a problem. How can organizations stress test their network against such attacks? We turned to Alan Newman of Spirent Communications, which manufacturers network stress-testing appliances and simulation software, for some ideas.

Tools to Secure Your System, Privacy, and Sanity

How can you know you haven't been connected to a look-alike server, and how does it know your device isn't infected with malware? New hardware specification models from the Trusted Computing Group may help.

Quantifying the Threat from Insiders

Your greatest security risk may not come from outside attacks but from your own employees. Setting policies and procedures aren't enough to stop the problem, but new security event management technology can help.

Four Criteria for Choosing a Distributed Security Solution

Only distributed security can protect the borderless enterprise from today's threats.

American E-business Struggles with Global Fraud

Forty percent of U.S. credit card fraud traced to handful of criminals from just five foreign countries; risk of punishment not a deterrent